Analysis
-
max time kernel
72s -
max time network
154s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
11-10-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb.apk
-
Size
1.8MB
-
MD5
d93aa844d1efd467a852197becaaeba5
-
SHA1
86f9db683a8c5c73b680fb5bb4c657fe7a24ee92
-
SHA256
fcd05b786c0a52a81683dc6ff537e3409bbd3a865129799ccf1be3477bf11ecb
-
SHA512
2da028a18a7dce27bd32d280ffcc8ca64ff4c85f615aaf38314d7ed371fcd8c0266b35251a999354daefc0f12c312164870ecc643610f89c9f0674bb025959fe
-
SSDEEP
49152:1ZxjSSRkcXX2No3c9R889VpHuFT1M7HL52emrWhLko:1bZ9X2NucH8gZKC7HLEemKP
Malware Config
Extracted
cerberus
http://94.250.253.26
Signatures
-
Processes:
com.proud.firstpid process 4469 com.proud.first 4469 com.proud.first -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.proud.firstioc pid process /data/user/0/com.proud.first/app_DynamicOptDex/AUFD.json 4469 com.proud.first [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.proud.first/app_DynamicOptDex/AUFD.json] 4469 com.proud.first [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.proud.first/app_DynamicOptDex/AUFD.json] 4469 com.proud.first -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.proud.firstdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.proud.first Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.proud.first Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.proud.first -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.proud.firstdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.proud.first -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.proud.firstioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.proud.first android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.proud.first android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.proud.first android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.proud.first -
Requests changing the default SMS application. 2 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.proud.first -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.proud.first -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process Framework API call android.hardware.SensorManager.registerListener com.proud.first -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process File opened for read /proc/cpuinfo com.proud.first -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.proud.firstdescription ioc process File opened for read /proc/meminfo com.proud.first
Processes
-
com.proud.first1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4469
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5f777d7fbf39198aa0b0240b7ede57446
SHA1c19e269a03ef0a1adde8fc6a73c1abe0fbbc9f4b
SHA256ea2b839d7a79476eed3b91618d2f86f18867560d02aefd3ab4deca4a18c4a445
SHA512e186959e4ea03986bc071a4f892762db8c29a3a461223b09cbb3dcb57939f1c00ae441ed2b62ab93e0294282983daf9e8c7a0221287fefe47a791997f83676b4
-
Filesize
35KB
MD5bbc054667b524688c5a80f1055ecafec
SHA18a16632430608f8337a1a3be56d9efd93edf2f4f
SHA25608e3325835dbb04f0cf09c12b8c69a053d19e71abaa71359c93947d459bb14b2
SHA512d187c7035166933f616eac3995123ec632df77ac0a0230af7e78c3adcc772e90212ebbc4c1685ac7c6ddd8abb4bf84f0f385ea0b8b0c133d9dc0b7b503327c10
-
Filesize
77KB
MD5fbfec32963eec74794d898179aee8b56
SHA1cc98bdf6e6fc12d7fb8ec6caf36d7b0cb35f7ca6
SHA256d15f4935437ed4422d98c2c68a1d352a781300349596adba217d9b2b94e2eca9
SHA512f846a87654034a0e00044859e354598e244d4d52c0af1bc9240b143c566919c0aa108baaeb9bf24e8c030f973b1202c417e82d72db7b0b045ba2371fdc5c1bfe
-
Filesize
149B
MD56f74abd05db2f32aae751a61ca93e3d7
SHA15a65394a6aa8dfe7206e71d76306928457a60f24
SHA2569703863b3511482a8a5c81a0628a81f4186905673d906ffabdbfd144ed98dddb
SHA51282c73307ac194d9814e16efb4d551d6aca73972a52cf283fed919f07947b7c0109982273944535362b956b8fa4b86bf73a982db7941669968b7ee5031b3e917c