Analysis

  • max time kernel
    70s
  • max time network
    132s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    14-11-2024 22:03

General

  • Target

    1ea104352c16532204692e8e508433b8cea31d9ac1b80bd5ae6360b0a00be78b.apk

  • Size

    1.8MB

  • MD5

    e7e2f6d3f4dd11eaa700e91c5453c1fb

  • SHA1

    ac4534de63725c1bf08e3eb0d069279e26dfffdb

  • SHA256

    1ea104352c16532204692e8e508433b8cea31d9ac1b80bd5ae6360b0a00be78b

  • SHA512

    02e3f34a7073ceee74093fdefc2dc8a012e0d0c3d0c5cdc06ef5441ab54765d999a95b922bbe7315a90635f99e49f9b9e0f8331e35697123db5067609bb72db5

  • SSDEEP

    49152:M7/1f6YGBpltmVDLth1DTXuFHE+2TLCBem2WhLHW:M7/IHmVn9TXKP2TLIemlY

Malware Config

Extracted

Family

cerberus

C2

http://94.250.253.26

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus family
  • Removes its main activity from the application launcher 1 TTPs 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Requests changing the default SMS application. 2 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Tries to add a device administrator. 2 TTPs 1 IoCs
  • Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.amateur.crime
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Tries to add a device administrator.
    • Listens for changes in the sensor environment (might be used to detect emulation)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Checks CPU information
    • Checks memory information
    PID:4251
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.amateur.crime/app_DynamicOptDex/wdAnr.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.amateur.crime/app_DynamicOptDex/oat/x86/wdAnr.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4277

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.amateur.crime/app_DynamicOptDex/oat/wdAnr.json.cur.prof

    Filesize

    216B

    MD5

    0d60eb220bbbc3ebc96c70a5ffb421b2

    SHA1

    74004bf89eaff41b26444bd5ea6424ed74255e6d

    SHA256

    11116b878a7720b4bcb9d5ba131756c49f7150c87346f1f939e9e45d21395ce9

    SHA512

    f35f877d8b8f926de706b225ddd7cd1f014c5b322b79cde7b797711f02c0890cc682c5b39bf5269f9b3a57652b1572c20f097d154be3fa7436e47d2b51734413

  • /data/data/com.amateur.crime/app_DynamicOptDex/wdAnr.json

    Filesize

    35KB

    MD5

    8acd55c8b9474bc98cc5a9362f6dcd47

    SHA1

    761fe5911be43bc492c73cfb2e72a73e299bd42b

    SHA256

    b386e93c90096f70f16d66efb62a3b4196cc5e15f8aa7313eef5e9d74ae82e9c

    SHA512

    fa7a88e1a98706858d71df6227654bbec0abe11c087ff9aa59faab354d82d6862891a415f82b5c03580bedccef3685bd8477922a3b2e52ed31fc67adae05b8c2

  • /data/data/com.amateur.crime/app_DynamicOptDex/wdAnr.json

    Filesize

    35KB

    MD5

    1e6cd9fde99b9cf84b7cf9a7cd0f578f

    SHA1

    b36499cafc0de31a1af9d4f11e379411e40a73a0

    SHA256

    4a0b5f4434ec88fd1e54adcd520374bacef99d319fb3751e0cf0595fffc26702

    SHA512

    90f2db9fb576f55e5ebc6e5436fa454aad9b8c35a40cb7ceaa1526ddee9f788ae6e7cc5bb3be4afa2dba9692307809162a47a0069d30e375b767a42c857943cc

  • /data/user/0/com.amateur.crime/app_DynamicOptDex/wdAnr.json

    Filesize

    77KB

    MD5

    9dfa580aa93694ae97b83ecb5cfa9ff5

    SHA1

    b17c51cbd1dad8b069e2ac3adab7fccfd6bd624f

    SHA256

    caaa953fc8d5eb5d2cbac6e280ed76c7e3ddaa2f0f4eb2ed5e7d58b7b7015ddf

    SHA512

    22c51103d9bdf7997ccb6557c92613f431b9c643a1825d4264fd4767a0f1f8e66b8f2719ccbcda1bf5aae2c9448729212e722b6d9091a4f1c7eb6cb6bdb034fb

  • /data/user/0/com.amateur.crime/app_DynamicOptDex/wdAnr.json

    Filesize

    77KB

    MD5

    fbfec32963eec74794d898179aee8b56

    SHA1

    cc98bdf6e6fc12d7fb8ec6caf36d7b0cb35f7ca6

    SHA256

    d15f4935437ed4422d98c2c68a1d352a781300349596adba217d9b2b94e2eca9

    SHA512

    f846a87654034a0e00044859e354598e244d4d52c0af1bc9240b143c566919c0aa108baaeb9bf24e8c030f973b1202c417e82d72db7b0b045ba2371fdc5c1bfe