Analysis

  • max time kernel
    40s
  • max time network
    153s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    19-11-2024 22:07

General

  • Target

    b4c6e7a2fb3e12086f62fdc9c9affdbcd3cd8afec9c31ddcb8d4e63623d53faa.apk

  • Size

    1.1MB

  • MD5

    b7eaef18ad36959d8a8e0b2679e599cc

  • SHA1

    18772cc9692c191a735f3e54c8a4a5e61d560ff3

  • SHA256

    b4c6e7a2fb3e12086f62fdc9c9affdbcd3cd8afec9c31ddcb8d4e63623d53faa

  • SHA512

    c31ed403e8102566ce2f7466ce2351843c71279e639866f9afef55f70423adb2292b13254b54bcf1108c0f8a7bf5e20614bf73eb312432ef20c5f54ec7a44daa

  • SSDEEP

    24576:IMkMbI7/eNErv6PA/zlQ2cq3YuKfC4e+QmzaxCW:vDs7eNEuYRQ2cqIA4XV+xCW

Malware Config

Extracted

Family

cerberus

C2

http://sappzaebiservak.ru

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus family
  • Removes its main activity from the application launcher 1 TTPs 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.trick.caution
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Listens for changes in the sensor environment (might be used to detect emulation)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Checks CPU information
    • Checks memory information
    PID:5129

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.trick.caution/app_DynamicOptDex/IXKMOQ.json

    Filesize

    64KB

    MD5

    8d47a330ea0c3b85b79ef7be01d91038

    SHA1

    4bc900bca1dbf260325f75aea8e959598f3ab42d

    SHA256

    73966cc69c294785a97a927fcd25759550b04b71002a37991492f1ecd1804781

    SHA512

    1d96ccdb2b7612b8d1f116c9d628d33813d3a385abb53f0d7fb6f63cbb359fe1be8383c47b26e15fc7f8d764c5c3f7af209ac344e07554566bc82145bfb63a3c

  • /data/data/com.trick.caution/app_DynamicOptDex/IXKMOQ.json

    Filesize

    64KB

    MD5

    1c0d6fcf5bf5ea22740e29ddd03f963a

    SHA1

    4cb64e8eee15e10e4c7af721c9c85ea1e188446a

    SHA256

    f982900969f8e86e637d1fea740c3954d7a99db0da3464214c1b612d2c15a249

    SHA512

    c2cdbd62d8307bc0bf5d57eef16ea93a4419f3842eeb0828376ec952f2d648c07b5fb29eee2856ea0e4887cf1bb3cef580ba7ea9122f724df236f230349cb8cb

  • /data/user/0/com.trick.caution/app_DynamicOptDex/IXKMOQ.json

    Filesize

    118KB

    MD5

    08f818e7b9a7b3d91d0c64db2adfe623

    SHA1

    1e17fc5a6bd7d29307dd04df8bbc4edeb9680e1e

    SHA256

    252acf5a3ea28210b475900263cc192c3422984522b5e7e50e7ac18bd2e579e9

    SHA512

    6177922b522f05f44ad45c82d9719bf718e9bf44fcd8354f01339feb0ccf657d5ffcc4060cd37544f116ad55e28c3a64b31f31ab5b2613a935229d595fbcfa36