Analysis
-
max time kernel
150s -
max time network
160s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
09-08-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
40f497133ba37928b8276d7b0a774778beaf2518ff82b53608be98648dd25ca5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
40f497133ba37928b8276d7b0a774778beaf2518ff82b53608be98648dd25ca5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
40f497133ba37928b8276d7b0a774778beaf2518ff82b53608be98648dd25ca5.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
40f497133ba37928b8276d7b0a774778beaf2518ff82b53608be98648dd25ca5.apk
-
Size
1.2MB
-
MD5
5c59436f70e8f57b9600be224324c495
-
SHA1
c4a4e111a48af8ca14ef4ccd36320f6183e2137f
-
SHA256
40f497133ba37928b8276d7b0a774778beaf2518ff82b53608be98648dd25ca5
-
SHA512
6d664d5fb6bd2d494d97db2b7ba3b769674f8e4f9a301baa1661c981ccc7f0fd9ffcaeca3192b2d712266bbd5a4d558fd94ae0d08cd60ecaae138987f3904710
-
SSDEEP
24576:8w93w9JcP86lPFuNx84vVCx3hBYpmQevhcAXhQLh75X+TET8AF8X:DSbcU6lPF2x849wxeuuyhoh9OTETNQ
Malware Config
Extracted
cerberus
http://195.201.239.40
Signatures
-
pid Process 4271 com.pipe.assault -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.pipe.assault/app_DynamicOptDex/Hah.json 4298 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.pipe.assault/app_DynamicOptDex/Hah.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.pipe.assault/app_DynamicOptDex/oat/x86/Hah.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.pipe.assault/app_DynamicOptDex/Hah.json 4271 com.pipe.assault -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.pipe.assault Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.pipe.assault -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pipe.assault android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pipe.assault android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pipe.assault android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pipe.assault -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.pipe.assault -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.pipe.assault -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.pipe.assault -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.pipe.assault -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.pipe.assault -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.pipe.assault
Processes
-
com.pipe.assault1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4271 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.pipe.assault/app_DynamicOptDex/Hah.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.pipe.assault/app_DynamicOptDex/oat/x86/Hah.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4298
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54eed8e3f6bdd1c311db382313b9eaf8d
SHA1524cc4c109e811d360d78bcb750119cec2bdb104
SHA256f955009a6a947a3fb2fc804ccec1ed43ac6b54cd12dd0b16a1de8093ab733177
SHA51281ec22a2181d53e09afccbd33413b906db62c277e846c629fc0c117d68870c47729ffa08a257a73d4cba50bc82e48a60018c7256db4e889f6d50f21f1ae8b8eb
-
Filesize
64KB
MD544ae2b14a899213c637462b5a3fba106
SHA1b38077e14a6378b077dbb12d628112dfca266398
SHA256b24d0720d475767efad2a076ee53168719128266f2a8a4f634b96dabe0de63ca
SHA5128e4780cfca6045a00d979db822f0c72da2dcd2ce9f7ac36a642dbfdfa23017687e4479c1b96a8dc2d42c9713ba71eb0cffc6c2829ca0c5597a5b7d19447f7f25
-
Filesize
801B
MD5e69977b15224926a74080e169064bb6b
SHA102a716eb143612206373042eadf01488b90b7701
SHA25627d92df439bd957f822238064c27b69614dcc7abcfc5fb57dfbe02e29fd84f39
SHA512426db8bf547f456452237052fd739509c2b10b98dde4c2a54df2cb3a48dd5c3eb620c6ae1e4331de0d2768defff9bb671bd3829e677d16d5b6f2a43233ea6a56
-
Filesize
125KB
MD5b8de20fee5764cbdcdb3732387804a81
SHA12793d9a8f46d82d193f4e27d1954e080c7d16f54
SHA256cfbfaea0d80d229d6fdebeab157e1a28be5c1a352a1de3c40ea494dc2c6da5f5
SHA5120aca7352885e2a110a6cc0bc0e387343eb543ad3efb4dd9354a1ac4cc2f63ab42b33fd86bd26b95992b17059f428c7ceedfa2ec9212d6379283fa2b42fc963d2
-
Filesize
125KB
MD5479825fe1e4f4e3694ef8ca647ad7218
SHA1b71f70373b3a8bf107f30f8bbbc74e760fc14f3b
SHA256443d3602205f8d3623969be557060efaa46611cffafc201dfa1bc50ab054dccc
SHA512a76ec1f7281e7fa0fafee143a1b815cf05a93a335cdad1facad8cce31b40b74b39db235d8bedc9bacbf63362084b5d2476f9575bdd97b67b599b4389a49b5c3d