Analysis
-
max time kernel
68s -
max time network
183s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
19-07-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
d6b8141956dd601dd64fc52235603dda1b6517fef720cd827510d6f15be5137f.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d6b8141956dd601dd64fc52235603dda1b6517fef720cd827510d6f15be5137f.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d6b8141956dd601dd64fc52235603dda1b6517fef720cd827510d6f15be5137f.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
d6b8141956dd601dd64fc52235603dda1b6517fef720cd827510d6f15be5137f.apk
-
Size
2.6MB
-
MD5
5e7056f3e817c4fbd20e6b528599cbfe
-
SHA1
dc5d44cdd3b025db6ae00f233bc7ccebdcd6e5c8
-
SHA256
d6b8141956dd601dd64fc52235603dda1b6517fef720cd827510d6f15be5137f
-
SHA512
04458af52a5c14ee6a215d108f642c67ea3fa0c7a0481d3c2db5971c658cf7b6206adf344d901498751357e5ace08db26fde1c6708002602d27be19202c8f2ad
-
SSDEEP
49152:oFcDPmH0OJqGutr+udFuhG+b0sJdM2ZOGfF2w+5J9k+GCRwUh7lUe3oy0wLGRfT:oFcwUtrxFuhG+blRnfF2f//UMoy0gYr
Malware Config
Extracted
cerberus
http://45.153.186.231/
Signatures
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
orbit.shrug.wearioc pid process /data/user/0/orbit.shrug.wear/app_DynamicOptDex/EFUeTX.json 4454 orbit.shrug.wear /data/user/0/orbit.shrug.wear/app_DynamicOptDex/EFUeTX.json 4454 orbit.shrug.wear /data/user/0/orbit.shrug.wear/app_DynamicOptDex/EFUeTX.json 4454 orbit.shrug.wear /data/user/0/orbit.shrug.wear/app_DynamicOptDex/EFUeTX.json 4454 orbit.shrug.wear -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
orbit.shrug.weardescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId orbit.shrug.wear Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId orbit.shrug.wear -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
orbit.shrug.weardescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener orbit.shrug.wear -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
orbit.shrug.wearioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction orbit.shrug.wear android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction orbit.shrug.wear android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction orbit.shrug.wear android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction orbit.shrug.wear -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
orbit.shrug.weardescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone orbit.shrug.wear -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
orbit.shrug.weardescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS orbit.shrug.wear -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
orbit.shrug.weardescription ioc process Framework API call android.hardware.SensorManager.registerListener orbit.shrug.wear -
Checks CPU information 2 TTPs 1 IoCs
Processes:
orbit.shrug.weardescription ioc process File opened for read /proc/cpuinfo orbit.shrug.wear -
Checks memory information 2 TTPs 1 IoCs
Processes:
orbit.shrug.weardescription ioc process File opened for read /proc/meminfo orbit.shrug.wear
Processes
-
orbit.shrug.wear1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4454
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
691KB
MD552d7e1d8f3aa91690541396c3bc8a515
SHA1e0a4cb67c9a3fac3567f6e7f135c2d6686b8170b
SHA256f0867f69554cd06631e703d5acbe2050802c821c0d86c8eae7dba8476842a7de
SHA5127dd3696e8e728d2c3f0e30c1b00e8d32977c7fdd79b8bc727f91002be9e40ad220eb2762c2f457b69156c9fef8b6dc9b35936656e70dd916f86770fff146077b
-
Filesize
691KB
MD598eaba40eeb6a3cc175ff20683965a8d
SHA10a0be08dd22e1342f8db1cd046d52a655b170e67
SHA2566ea173d561fa79bc67802d6a9f992d0cae8c88a3b80cb7f6e9c98caf319734da
SHA5125be009bb3e6a1346bced772a2e503a4c6a6251faf72e6d1d40803db764980f6c0652a1cd7c21aa53f42bb4c5ad4c7700486d559d6f9d479fb3c9684b5f9f2ac9
-
Filesize
252B
MD573fdc4b09430909a663e1eec22bee036
SHA1b66a4a7dff39f5084b55c29a034c38b7bcfe2fd0
SHA25647efb50aefa9821dc9d4b2ed2092dbb2bccf728667bade6613b221e4680bd109
SHA51269da6609467fc2d24aba3fc1082a32e006b778faa2a02f3563c03425b60a5090a983544eb16dd3644a5fe60772b9294eb9299337a97615fcacc13c502f8493d4