Resubmissions

09-11-2024 01:30

241109-bwtfqathrc 10

08-11-2024 23:26

241108-3exwcsvmbk 10

Analysis

  • max time kernel
    36s
  • max time network
    152s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    08-11-2024 23:26

General

  • Target

    7ddaa67b5227cfd414b1f55c51f1ed8818ac995ec9670893ee01804686203889.apk

  • Size

    1.9MB

  • MD5

    8f582084127a364695aa007925f74065

  • SHA1

    62a27bbacee4314e3fbf99777f3be0eb4c30b158

  • SHA256

    7ddaa67b5227cfd414b1f55c51f1ed8818ac995ec9670893ee01804686203889

  • SHA512

    79b718cddecb321eee1464d54a32398690acc92c88faf0dec2a44fe23dce606382fdf033b3542c913ccd35174a78ffd466b246a38e4da0505da91ef8f3957d08

  • SSDEEP

    49152:D68Y3e+Cj1Z9KoKndF0KP0J0801fjSRZg/60dmcl1dIpkJgRh5HH:D68b+IZKbjSM60CMeHH

Malware Config

Extracted

Family

cerberus

C2

http://mtrfff.ru/

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus family
  • Removes its main activity from the application launcher 1 TTPs 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Requests changing the default SMS application. 2 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.engage.balance
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Performs UI accessibility actions on behalf of the user
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Listens for changes in the sensor environment (might be used to detect emulation)
    • Checks CPU information
    • Checks memory information
    PID:4796

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.engage.balance/app_DynamicOptDex/cqRnt.json

    Filesize

    64KB

    MD5

    3ed422ca54b4434ae8dd44e213b27e44

    SHA1

    94bd931df2d62c5363027e8ca96b2b7294752c2f

    SHA256

    26b311e2d028cf11e92992e116dd194707a5fe6c05156e62dc6b35f41fdaa445

    SHA512

    15f027de7ba8e61a801c543d2a793e8e9644e02705070f54d776d650f1110a983b23533a24d2d86466566553fd4fed652052f9cdc0ce109d6731ec77991f5e9d

  • /data/user/0/com.engage.balance/app_DynamicOptDex/cqRnt.json

    Filesize

    64KB

    MD5

    38784e81c7eec5c91bebc5cf4db4180f

    SHA1

    dba251ecb631664df220d24d2a9613853f31b74e

    SHA256

    394c2a191f6f21c5f61c6fe7e71a0664765db20ce51a8027b76911ebd02de560

    SHA512

    af4e8b63f1b7b1868636ff4db302eb5bcfdcd8568c0af499f32502c061883620401c14ca6a5c0061abc051d87ae3becd9ae5af1ff13c2ceccb83ba63052689b2

  • /data/user/0/com.engage.balance/app_DynamicOptDex/cqRnt.json

    Filesize

    118KB

    MD5

    7a2061c494a7c63a9bf4d73d547f9c96

    SHA1

    c7108e09052f79d4b9541a0f8339328dd66d52cb

    SHA256

    43102338da114ef1801426eb439bcfbd5319fdd28dec6672537753ac2db5b30e

    SHA512

    7c0a456b1044dfab5ab4b0830fd0005990c1f2b4d6e5875286a068c4c6bf36d88f8cca9b3c825eef8f11968f4f847c11be6cbd7ce4070b9dc6b7c68d08b8fc20