Analysis
-
max time kernel
87s -
max time network
136s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
11-09-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
c2b9f492d3040c10903ad69bc0f4c72eb7ba586c878fe0c957709c7bbf85d263.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
c2b9f492d3040c10903ad69bc0f4c72eb7ba586c878fe0c957709c7bbf85d263.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
c2b9f492d3040c10903ad69bc0f4c72eb7ba586c878fe0c957709c7bbf85d263.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
c2b9f492d3040c10903ad69bc0f4c72eb7ba586c878fe0c957709c7bbf85d263.apk
-
Size
1.7MB
-
MD5
7bda64a406ad69de1d84abe9a6ef5bb7
-
SHA1
12bba2297584da061f0e47c54e702c280c613363
-
SHA256
c2b9f492d3040c10903ad69bc0f4c72eb7ba586c878fe0c957709c7bbf85d263
-
SHA512
8635978eb7009859878f57d70a1430ec76f82c49480d858e104719c747476dc473166d37010f4f5df13ae80e7faf6f94865b35aa625102c90914bab88cfdd0fd
-
SSDEEP
49152:o8w2m+iqJer293Z6DoipFMtdy3uFD6sXfL1qemfWhLXb:oOm+iqkoB+K7XfLMem+9
Malware Config
Extracted
cerberus
http://80.87.195.45
Signatures
-
pid Process 4449 com.discover.robust 4449 com.discover.robust -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.discover.robust/app_DynamicOptDex/Oqhf.json 4449 com.discover.robust [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.discover.robust/app_DynamicOptDex/Oqhf.json] 4449 com.discover.robust [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.discover.robust/app_DynamicOptDex/Oqhf.json] 4449 com.discover.robust -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.discover.robust Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.discover.robust Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.discover.robust -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.discover.robust -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.discover.robust android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.discover.robust android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.discover.robust android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.discover.robust -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.discover.robust -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.discover.robust -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.discover.robust -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.discover.robust -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.discover.robust -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.discover.robust
Processes
-
com.discover.robust1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4449
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5f1eb8aa2274b26bc08ce5131f43390c6
SHA18123c3018ce6bbff86f4c720798543ed64e87255
SHA25607c8e939ed14c98ead8574149b73464b8fff1c5ca0415ab2bc824d10ce0f1581
SHA5125ed42e56ac41c443940b0545b5f7fe1024e5de118f0ab157f1828f7952fa62fc19da489e9d5c863f55a8175cd52d98bd556a4535cfb417ca93c4b70aea10808a
-
Filesize
35KB
MD5e2a814022c1d7fa66a38b1406a0130ed
SHA133dbce9df64df78a354e1470d56f347fd1dbb227
SHA2566be9ec6f17d525efb65c16f4db0de01b21a1befaded8a85c5eddf05fa316f5fd
SHA512c1cc496233569bdbcd80b9d82184ed2ff52a0fa6172fb83a3ab67600f76f02eaffaae236e31e29ce4e7557f8194e0f210b471a49596968aec70f8fc3ab43af89
-
Filesize
77KB
MD51c1804316a214e9224806f826b10046c
SHA1d28c6e775e47171eebbef8ac2b27c788c8c136fa
SHA2565868eaffe0d1cdae5f65c64e5d90d045cf394fc4a7e4241e87dfb048034cf289
SHA512c5d31f0e3e35657a66cc1f2071be37c47a404557a4f0c06f42f857994934e6372b0606b12293372f250bd91cff050dbaecc909aa6251971c06f062b50f5ef423
-
Filesize
148B
MD5c9a03d68bcad26e8e027ebbd14a4abf3
SHA1d6ee2179f527d194cf9d2b8b49da82a11c0c2c44
SHA256e64d1cb9e46b156c2fe13cac93c0db77a43e9b645fbe8f96cc0cf6fb38f36177
SHA51246c4a9352af1b765df15c3c2c8fd378c7f3cb96687e03739cfd4bf6aa276c3e76d4d462bfa2c2f1f674344837b9d97ba8fa192b2136a12ac9a929fcba36a7ced