Analysis
-
max time kernel
78s -
max time network
135s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
eff6b7bde1c49490ad24626fd337035d1d344ec32b0d72e8b9d6faa859ef09e6.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
eff6b7bde1c49490ad24626fd337035d1d344ec32b0d72e8b9d6faa859ef09e6.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
eff6b7bde1c49490ad24626fd337035d1d344ec32b0d72e8b9d6faa859ef09e6.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
eff6b7bde1c49490ad24626fd337035d1d344ec32b0d72e8b9d6faa859ef09e6.apk
-
Size
1.6MB
-
MD5
ac2f494903ddf498c9bc40e516d089ac
-
SHA1
0569a9427d8c8b941462236b839b52c05aec767c
-
SHA256
eff6b7bde1c49490ad24626fd337035d1d344ec32b0d72e8b9d6faa859ef09e6
-
SHA512
6f541ee21207b62ce0ef94b59646e848143c2460eabd27158355d043b5a2a652b4404356fb77cf2143e9be2f662ada36707cb860385422d4d55250ba5ee8d444
-
SSDEEP
24576:TXa+MBamonLRqNoyyQu/KY4ldK5juNvuF3q4zzEAV2pIpMvbGOZAC7mtDvjFa0eO:uvunFsTyQG4lIAXkdV2pJvQC7ubp/e/W
Malware Config
Extracted
cerberus
http://klastersbasters.ru
Signatures
-
pid Process 4630 com.friend.wool -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.friend.wool/app_DynamicOptDex/Qd.json 4630 com.friend.wool [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.friend.wool/app_DynamicOptDex/Qd.json] 4630 com.friend.wool [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.friend.wool/app_DynamicOptDex/Qd.json] 4630 com.friend.wool -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.friend.wool Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.friend.wool Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.friend.wool -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.friend.wool -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.friend.wool android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.friend.wool android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.friend.wool android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.friend.wool -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.friend.wool -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.friend.wool -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.friend.wool -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.friend.wool -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.friend.wool
Processes
-
com.friend.wool1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4630
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5d141d83650fd2b628ef0e310f1ea7f92
SHA1cf675c458ed7e201cb5ad5e5c20cddbf5128e3a2
SHA256c13ceb89303c455e039ad59b79adfe4d941d3f937573f95dffc2d41c2799fcdc
SHA512f3e0a0add042698aa16957b06f5dacc788dd3d172ea23148c4449d7f61d42d3355e50023a22761d78549e404f73eea1ee58413f74823ace4fbdd34aadfe71a8f
-
Filesize
34KB
MD55ad812c901c345ac99587236180f64f5
SHA1881c7324b45c4295ffca490c9e59eb8095be37b5
SHA2566abe41ffdb5cffded33dd7353243c975bf82bf92eafb3b0efe95e7b9a9ccb8cd
SHA5123d7950d6e6e17357d90b9f84f0ed3110e3ddc03660a601a7cdd783ef6e2d0b72393fb716ef5f5a33cddf64ad4b152a8a9d531d31d9b548f1cea217ed247cf7c9
-
Filesize
76KB
MD537482302c790d376f129a2a7870c49de
SHA1ead6fa34e880f922f25dfb8757bbc4e1811e9acf
SHA25661b1d3f0da3330fadad0ef253d358b9f801e172e5b2872ca8a4935b35ab8f7e5
SHA5123a2413de0bfffbd231c743e61c728c53e9da042358dcb6da55985129f8e3ec6c50cb122239d2962172f0799a7ac7936f556f06a85ff0c01fedd5ebb2ddda8d93
-
Filesize
148B
MD5f430d34dfc8c1a9a5be6a98c1a2320db
SHA1cb3b38e475bc981a503a7d84b883619f2826c91a
SHA2565c88cbac2d718dc14f52818717719525fdc38d49cd0487fb6683cb48e417767a
SHA51275fc3d9d7884dded0bca769ae387ea9a06d17931909870e5184659693fbd959623761a72fd3a35e5f37f77911a4813282fcfe85ea358258112a80cc60bd38147