Analysis
-
max time kernel
150s -
max time network
187s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
06-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5.apk
-
Size
1.4MB
-
MD5
747ecc27336dabf945c58080141ebdbe
-
SHA1
99259a36c31b41a8cf2aa6874149d5029a9339b8
-
SHA256
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5
-
SHA512
8cb512511ef6eee671492035d9312719f8b6cba42972d0aeb981546064016cd72c92a8cb68d408f1e9dd0d1b9587e3dd8c6efe81034393ea616da46b5d71072e
-
SSDEEP
24576:VzYJGU82fgS1OOx+2lZrCEV6hNPo9Wi7cQJudQE9lYAXhQLh7X5GT8Afmhv:KLqEOX2lZrC66E91cUyhohD5GT3m
Malware Config
Extracted
cerberus
http://212.109.198.127
Signatures
-
pid Process 4252 com.abuse.put -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.abuse.put/app_DynamicOptDex/aci.json 4278 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.abuse.put/app_DynamicOptDex/aci.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.abuse.put/app_DynamicOptDex/oat/x86/aci.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.abuse.put/app_DynamicOptDex/aci.json 4252 com.abuse.put -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.abuse.put Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.abuse.put Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.abuse.put -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.abuse.put android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.abuse.put android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.abuse.put android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.abuse.put -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.abuse.put -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.abuse.put -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.abuse.put -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.abuse.put -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.abuse.put -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.abuse.put -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.abuse.put
Processes
-
com.abuse.put1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4252 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.abuse.put/app_DynamicOptDex/aci.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.abuse.put/app_DynamicOptDex/oat/x86/aci.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4278
-
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5bb9b9b57e5693e837c159ff4a2adb27f
SHA173f92fc4fb08ae0aa0222f5925a45ab71573bbfb
SHA2569ffaf577744334e68ebd72234c3e72310f33435b4b57d8e083f91f6601108341
SHA512447c08eccdee1482c14d7dd9bb3f078486d751f7f90ae22e343add9f999a303146bfeb192872bf7be78dfa502bf802b1c2a15ff10d3428e0a464bed0201352ba
-
Filesize
34KB
MD509a288fa2cac08cd82260b31839d072d
SHA1a2c2020cc846137d8f2dd9ce416a396df790c9c0
SHA256aefe60b0f455d84524479dc70ad9e80279d6e34ef939f4118692be83fc0f65ae
SHA51290384bc0e9aa6fc183d8cb4e4efe123a0d6040946425113042552751116a751ce335942308cfeb180a7f5981bd6231c0d591f049eba4112f9fc158d0b88f6b05
-
Filesize
216B
MD59749f7d419ee870385784dc64436ddb6
SHA10e44fffbd5a35653f1d9d311ef4d5357f70349b6
SHA256e105e982073218fecc8a828d1cceb9588a05a907ee635c3a910bcc64fc91b730
SHA5126c82300489986039912830d0d989ccbc1a17f190569ab213097e95f0caff85960c8a502a5a68aecb0f8e1d019034d6aa42abca6fa3c8e034d8ee0b332ef003e1
-
Filesize
76KB
MD57a0247380b9942418f24b769da56109c
SHA1d5ce768e004a92ba67ebf28bb15ec0d968e9f526
SHA256cf65722dc8e2a327be4dfa6ed865fcbbc3ed19c1e759fc0358bd85a41f2c39aa
SHA512d593f5204edb42f0793bb8e323a154ca1c64ade0423819fef2e32ec5448cf751351f67cd2b8823afe229b633b61dcdbb6550089e4acb7ffc08f2a2820efb44ab
-
Filesize
76KB
MD5ffc14c1925004660506364445e76896e
SHA1680b2883d1a52ac3ac078278e5343c17dcf4968a
SHA256297774b1fcb1300f1b9412af579ad224f0fe6728c8724ffa3e5142bb6d86cdff
SHA5128e9aced62559d379a1d9d267e52e721d16b61e1d83853b2b797587d8943fe483ef1c2adec0d75189b19182f153a44d07f2d00fc3257dd889a719852b7d25a2cf