Analysis
-
max time kernel
79s -
max time network
149s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
11-10-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb.apk
-
Size
1.8MB
-
MD5
d93aa844d1efd467a852197becaaeba5
-
SHA1
86f9db683a8c5c73b680fb5bb4c657fe7a24ee92
-
SHA256
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb
-
SHA512
2da028a18a7dce27bd32d280ffcc8ca64ff4c85f615aaf38314d7ed371fcd8c0266b35251a999354daefc0f12c312164870ecc643610f89c9f0674bb025959fe
-
SSDEEP
49152:1ZxjSSRkcXX2No3c9R889VpHuFT1M7HL52emrWhLko:1bZ9X2NucH8gZKC7HLEemKP
Malware Config
Extracted
cerberus
http://94.250.253.26
Signatures
-
Processes:
com.proud.firstpid process 4932 com.proud.first 4932 com.proud.first -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.proud.firstioc pid process /data/user/0/com.proud.first/app_DynamicOptDex/AUFD.json 4932 com.proud.first -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.proud.firstdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.proud.first Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.proud.first Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.proud.first -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.proud.firstdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.proud.first -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.proud.firstioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.proud.first android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.proud.first android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.proud.first android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.proud.first -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.proud.first -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process Framework API call android.hardware.SensorManager.registerListener com.proud.first -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.proud.first -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process File opened for read /proc/cpuinfo com.proud.first -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process File opened for read /proc/meminfo com.proud.first
Processes
-
com.proud.first1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4932
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5f777d7fbf39198aa0b0240b7ede57446
SHA1c19e269a03ef0a1adde8fc6a73c1abe0fbbc9f4b
SHA256ea2b839d7a79476eed3b91618d2f86f18867560d02aefd3ab4deca4a18c4a445
SHA512e186959e4ea03986bc071a4f892762db8c29a3a461223b09cbb3dcb57939f1c00ae441ed2b62ab93e0294282983daf9e8c7a0221287fefe47a791997f83676b4
-
Filesize
35KB
MD5bbc054667b524688c5a80f1055ecafec
SHA18a16632430608f8337a1a3be56d9efd93edf2f4f
SHA25608e3325835dbb04f0cf09c12b8c69a053d19e71abaa71359c93947d459bb14b2
SHA512d187c7035166933f616eac3995123ec632df77ac0a0230af7e78c3adcc772e90212ebbc4c1685ac7c6ddd8abb4bf84f0f385ea0b8b0c133d9dc0b7b503327c10
-
Filesize
149B
MD57452bdb5341ff24813df99bc07c93e5d
SHA10680495e737dd681e229317252aab1b3c66d472d
SHA2565d206423c1eed7c6ba31e6fdf8821db9fb8a16da247a276d2c465f4ac7fcdce5
SHA51280daa1f3991431bc08ab969b7837b587c573e1cef256c70add108f56e60e9e0bb7d8d1e3e72c76c12e249f1d012a00320c001bc09cd622f34abea034437fb712
-
Filesize
77KB
MD5fbfec32963eec74794d898179aee8b56
SHA1cc98bdf6e6fc12d7fb8ec6caf36d7b0cb35f7ca6
SHA256d15f4935437ed4422d98c2c68a1d352a781300349596adba217d9b2b94e2eca9
SHA512f846a87654034a0e00044859e354598e244d4d52c0af1bc9240b143c566919c0aa108baaeb9bf24e8c030f973b1202c417e82d72db7b0b045ba2371fdc5c1bfe