Analysis
-
max time kernel
104s -
max time network
149s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5.apk
-
Size
1.4MB
-
MD5
747ecc27336dabf945c58080141ebdbe
-
SHA1
99259a36c31b41a8cf2aa6874149d5029a9339b8
-
SHA256
e4c1e4c6c91c097d7f8e8a63a3ec9a57447caea932f8c3701ffb326190a0b2f5
-
SHA512
8cb512511ef6eee671492035d9312719f8b6cba42972d0aeb981546064016cd72c92a8cb68d408f1e9dd0d1b9587e3dd8c6efe81034393ea616da46b5d71072e
-
SSDEEP
24576:VzYJGU82fgS1OOx+2lZrCEV6hNPo9Wi7cQJudQE9lYAXhQLh7X5GT8Afmhv:KLqEOX2lZrC66E91cUyhohD5GT3m
Malware Config
Extracted
cerberus
http://212.109.198.127
Signatures
-
pid Process 4475 com.abuse.put -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.abuse.put/app_DynamicOptDex/aci.json 4475 com.abuse.put [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.abuse.put/app_DynamicOptDex/aci.json] 4475 com.abuse.put [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.abuse.put/app_DynamicOptDex/aci.json] 4475 com.abuse.put -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.abuse.put Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.abuse.put Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.abuse.put -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.abuse.put -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.abuse.put android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.abuse.put android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.abuse.put android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.abuse.put -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.abuse.put -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.abuse.put -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.abuse.put -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.abuse.put -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.abuse.put
Processes
-
com.abuse.put1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4475
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5bb9b9b57e5693e837c159ff4a2adb27f
SHA173f92fc4fb08ae0aa0222f5925a45ab71573bbfb
SHA2569ffaf577744334e68ebd72234c3e72310f33435b4b57d8e083f91f6601108341
SHA512447c08eccdee1482c14d7dd9bb3f078486d751f7f90ae22e343add9f999a303146bfeb192872bf7be78dfa502bf802b1c2a15ff10d3428e0a464bed0201352ba
-
Filesize
34KB
MD509a288fa2cac08cd82260b31839d072d
SHA1a2c2020cc846137d8f2dd9ce416a396df790c9c0
SHA256aefe60b0f455d84524479dc70ad9e80279d6e34ef939f4118692be83fc0f65ae
SHA51290384bc0e9aa6fc183d8cb4e4efe123a0d6040946425113042552751116a751ce335942308cfeb180a7f5981bd6231c0d591f049eba4112f9fc158d0b88f6b05
-
Filesize
76KB
MD5ffc14c1925004660506364445e76896e
SHA1680b2883d1a52ac3ac078278e5343c17dcf4968a
SHA256297774b1fcb1300f1b9412af579ad224f0fe6728c8724ffa3e5142bb6d86cdff
SHA5128e9aced62559d379a1d9d267e52e721d16b61e1d83853b2b797587d8943fe483ef1c2adec0d75189b19182f153a44d07f2d00fc3257dd889a719852b7d25a2cf
-
Filesize
148B
MD5b4778af5828a0be00cda7a0867fca49e
SHA18d9646922f8e453ea78f6dc04a56f119d70c0998
SHA25604e63cf81c8473b0cde36fca205dd9819cbab8693ff5c0db6db9cb408426ed19
SHA512e0d81f99927a3ea8565e924eeea6698a0fae7f00fbcd3b9ce99bd07d2139de8d4c2ee8d21a2e8d9c5e53b6a6c8657a6648757ce75c7c60211aaeb48ccf9d58b4