Analysis

  • max time kernel
    68s
  • max time network
    183s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    19-07-2024 22:06

General

  • Target

    d6b8141956dd601dd64fc52235603dda1b6517fef720cd827510d6f15be5137f.apk

  • Size

    2.6MB

  • MD5

    5e7056f3e817c4fbd20e6b528599cbfe

  • SHA1

    dc5d44cdd3b025db6ae00f233bc7ccebdcd6e5c8

  • SHA256

    d6b8141956dd601dd64fc52235603dda1b6517fef720cd827510d6f15be5137f

  • SHA512

    04458af52a5c14ee6a215d108f642c67ea3fa0c7a0481d3c2db5971c658cf7b6206adf344d901498751357e5ace08db26fde1c6708002602d27be19202c8f2ad

  • SSDEEP

    49152:oFcDPmH0OJqGutr+udFuhG+b0sJdM2ZOGfF2w+5J9k+GCRwUh7lUe3oy0wLGRfT:oFcwUtrxFuhG+blRnfF2f//UMoy0gYr

Malware Config

Extracted

Family

cerberus

C2

http://45.153.186.231/

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • orbit.shrug.wear
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Listens for changes in the sensor environment (might be used to detect emulation)
    • Checks CPU information
    • Checks memory information
    PID:4454

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/orbit.shrug.wear/app_DynamicOptDex/EFUeTX.json

    Filesize

    691KB

    MD5

    52d7e1d8f3aa91690541396c3bc8a515

    SHA1

    e0a4cb67c9a3fac3567f6e7f135c2d6686b8170b

    SHA256

    f0867f69554cd06631e703d5acbe2050802c821c0d86c8eae7dba8476842a7de

    SHA512

    7dd3696e8e728d2c3f0e30c1b00e8d32977c7fdd79b8bc727f91002be9e40ad220eb2762c2f457b69156c9fef8b6dc9b35936656e70dd916f86770fff146077b

  • /data/user/0/orbit.shrug.wear/app_DynamicOptDex/EFUeTX.json

    Filesize

    691KB

    MD5

    98eaba40eeb6a3cc175ff20683965a8d

    SHA1

    0a0be08dd22e1342f8db1cd046d52a655b170e67

    SHA256

    6ea173d561fa79bc67802d6a9f992d0cae8c88a3b80cb7f6e9c98caf319734da

    SHA512

    5be009bb3e6a1346bced772a2e503a4c6a6251faf72e6d1d40803db764980f6c0652a1cd7c21aa53f42bb4c5ad4c7700486d559d6f9d479fb3c9684b5f9f2ac9

  • /data/user/0/orbit.shrug.wear/app_DynamicOptDex/oat/EFUeTX.json.cur.prof

    Filesize

    252B

    MD5

    73fdc4b09430909a663e1eec22bee036

    SHA1

    b66a4a7dff39f5084b55c29a034c38b7bcfe2fd0

    SHA256

    47efb50aefa9821dc9d4b2ed2092dbb2bccf728667bade6613b221e4680bd109

    SHA512

    69da6609467fc2d24aba3fc1082a32e006b778faa2a02f3563c03425b60a5090a983544eb16dd3644a5fe60772b9294eb9299337a97615fcacc13c502f8493d4