Analysis
-
max time kernel
61s -
max time network
152s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
29-02-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
af620a62ab5911587b55a402bda10e7b.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
af620a62ab5911587b55a402bda10e7b.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
af620a62ab5911587b55a402bda10e7b.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
af620a62ab5911587b55a402bda10e7b.apk
-
Size
3.1MB
-
MD5
af620a62ab5911587b55a402bda10e7b
-
SHA1
48da6580f1aee833b8c76fbf19df1c9bda7fbbba
-
SHA256
d8564f37d48a023ae2cbd2b7b27df61876a572b445db9c66ea904e95d2d64da1
-
SHA512
c6d56c031358b7322f05e66e69f05aa91ea6e203a3fd5e61a66ab26ad843023263c0f82f335399b40d40b7066e78a192625766e059e21539843c121fa7014d39
-
SSDEEP
49152:x2CEh6eaR+wZhFcZnZtC97wHM9fD6PmF/n/L7qP3mHwtVHu5qJTs1EIMxPFAa3s:zeGEnZte7he+hD7qeHYGqJuMtKa3s
Malware Config
Extracted
cerberus
http://kusurabakmahayat.xyz
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId adult.cross.grass Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId adult.cross.grass -
pid Process 5037 adult.cross.grass -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/adult.cross.grass/app_DynamicOptDex/Kanmko.json 5037 adult.cross.grass /data/user/0/adult.cross.grass/app_DynamicOptDex/Kanmko.json 5037 adult.cross.grass -
Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener adult.cross.grass
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651KB
MD57982a17a106c6699802e62208aadfb87
SHA12148d4aee3d239a776ca4b00b5a6b7d46feaa250
SHA256f4943da2e1974827edce0fd0153afcd9108b1c77aae599f3c600af6e92234900
SHA5129c31fd441593612eabc30ae1b86ca3a51778d938cde8190a41737d747e8c703b772a8b9774928119189f87bbc2f989600508f5fd10ebee9abd18583c68d1366b
-
Filesize
651KB
MD5fdd6a0df9c731eb8eee7148d50caef8d
SHA193ed5f9c544531a1fff4154d5e84cc4ace651011
SHA256c63913c0319bfd0df22b440d28bf15de54bea7aaaf075c1a50a58e8443bcb16f
SHA512f573e7c72da8b45b4e464a7b0ada118abbb6eda6544e3931e740ba716106cd839678cf0e843db6b6d92bb7669551746a13687627680063ef366ec64cb7bc8262
-
Filesize
280B
MD5a7d15f743496f2737a2cab7c98b70130
SHA16620b0eef8ee48444de2ce915c7641e07efe71cc
SHA256766d4022d0b1136fa9061b76d659c04918923e304c8d4ec54cfabcb4378c9927
SHA512e0cba841ee262f3bbac7898c41e6c7f9b4d0779795ebf974fc3690a0340ed2d4d60cb9ad25a4e34678ae6c5c60f87e23a15a521bca2e0ad0da3c3a7d4923c0f2