Analysis
-
max time kernel
86s -
max time network
181s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06-08-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
72d1f8e46abf0a6a8a3fd74ae50da4c5af1541fc222d0df9f3287edaba81d1ec.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
72d1f8e46abf0a6a8a3fd74ae50da4c5af1541fc222d0df9f3287edaba81d1ec.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
72d1f8e46abf0a6a8a3fd74ae50da4c5af1541fc222d0df9f3287edaba81d1ec.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
72d1f8e46abf0a6a8a3fd74ae50da4c5af1541fc222d0df9f3287edaba81d1ec.apk
-
Size
2.4MB
-
MD5
86c765bbf51aae7e2f45f83bf143f616
-
SHA1
3042f09a3f569e2a3735cca40319a42352a7e22b
-
SHA256
72d1f8e46abf0a6a8a3fd74ae50da4c5af1541fc222d0df9f3287edaba81d1ec
-
SHA512
8fbb899b54eed280804d1eddd4a639d4ef1b6538e0ee9e6d3e914d03f410147a53a81b3568601501de6ad9a49edcc55ceaf6bd58305610119d2cc3a0bcdb6407
-
SSDEEP
49152:wLoR4LwZ4EV2BRHHtHJORIJuKBGUEwTKJk26Q8G:w0R4ECEUBVBJO2uWEaKy2p
Malware Config
Extracted
cerberus
http://23.95.225.100
Signatures
-
pid Process 4504 victory.tired.volcano -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/victory.tired.volcano/app_DynamicOptDex/cu.json 4504 victory.tired.volcano /data/user/0/victory.tired.volcano/app_DynamicOptDex/cu.json 4504 victory.tired.volcano /data/user/0/victory.tired.volcano/app_DynamicOptDex/cu.json 4504 victory.tired.volcano /data/user/0/victory.tired.volcano/app_DynamicOptDex/cu.json 4504 victory.tired.volcano -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId victory.tired.volcano Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId victory.tired.volcano -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener victory.tired.volcano -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction victory.tired.volcano android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction victory.tired.volcano android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction victory.tired.volcano android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction victory.tired.volcano -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone victory.tired.volcano -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS victory.tired.volcano -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener victory.tired.volcano -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo victory.tired.volcano -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo victory.tired.volcano
Processes
-
victory.tired.volcano1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4504
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD50dc81d749b9d8cb61642c734dafe0380
SHA1e9d1c31d868613372efca1351a4f3df2830d32e6
SHA2561e4a275fb2bb78b648879500ed0de9805b8090e772b398ead4cdfd814dd57d7f
SHA512632ea3bd8099159e848b632fcdc3601af48e03b2f54623190fffad7401e224d5369aae575953daed96266a98bddbfd09180bf9ade48bc9de554a25a448031399
-
Filesize
644KB
MD5f36e4c1d69b100a199eaff2128c64899
SHA19a87b99a313b9d8d53306219437ef9a1537979f5
SHA2569363e4800547c0909e8bbd00e8201c97f3d6547ba501999f494ea299b531bae0
SHA5120277fa327ee5b8083e67f1db9dd209cec2af5e7f9e7cd4918f5be05f09c1d66c34556e5714cd4913fa21578bc7985f67052d05926962d78237d24c80f3a8c872
-
Filesize
233B
MD5eb2a1ccc3d81ae7b756f821cbacd7460
SHA14fa8ffb6ea2e75347101f58adf598ace59cf3eca
SHA25601d16a85d7d6ea72a8b66855dfa5d3427511b35ffce00874dad9f775b67bfb30
SHA5129c616614c2484ec2507763d618db1745b5dbfea2322d6a897c466e4cd41d70a042e6c616fefa4253205459c29512f29ecee25313195a791cc3d11a3a8ea7e8c6