Analysis
-
max time kernel
76s -
max time network
130s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
19-11-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
b4c6e7a2fb3e12086f62fdc9c9affdbcd3cd8afec9c31ddcb8d4e63623d53faa.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b4c6e7a2fb3e12086f62fdc9c9affdbcd3cd8afec9c31ddcb8d4e63623d53faa.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b4c6e7a2fb3e12086f62fdc9c9affdbcd3cd8afec9c31ddcb8d4e63623d53faa.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b4c6e7a2fb3e12086f62fdc9c9affdbcd3cd8afec9c31ddcb8d4e63623d53faa.apk
-
Size
1.1MB
-
MD5
b7eaef18ad36959d8a8e0b2679e599cc
-
SHA1
18772cc9692c191a735f3e54c8a4a5e61d560ff3
-
SHA256
b4c6e7a2fb3e12086f62fdc9c9affdbcd3cd8afec9c31ddcb8d4e63623d53faa
-
SHA512
c31ed403e8102566ce2f7466ce2351843c71279e639866f9afef55f70423adb2292b13254b54bcf1108c0f8a7bf5e20614bf73eb312432ef20c5f54ec7a44daa
-
SSDEEP
24576:IMkMbI7/eNErv6PA/zlQ2cq3YuKfC4e+QmzaxCW:vDs7eNEuYRQ2cqIA4XV+xCW
Malware Config
Extracted
cerberus
http://sappzaebiservak.ru
Signatures
-
Cerberus family
-
Processes:
com.trick.cautionpid Process 4491 com.trick.caution 4491 com.trick.caution -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.trick.cautionioc pid Process /data/user/0/com.trick.caution/app_DynamicOptDex/IXKMOQ.json 4491 com.trick.caution [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.trick.caution/app_DynamicOptDex/IXKMOQ.json] 4491 com.trick.caution [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.trick.caution/app_DynamicOptDex/IXKMOQ.json] 4491 com.trick.caution -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.trick.cautiondescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.trick.caution Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.trick.caution Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.trick.caution -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.trick.cautiondescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.trick.caution -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.trick.cautionioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.trick.caution android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.trick.caution android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.trick.caution android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.trick.caution -
Requests changing the default SMS application. 2 TTPs 1 IoCs
Processes:
com.trick.cautiondescription ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.trick.caution -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.trick.cautiondescription ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.trick.caution -
Tries to add a device administrator. 2 TTPs 1 IoCs
Processes:
com.trick.cautiondescription ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.trick.caution -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
com.trick.cautiondescription ioc Process Framework API call android.hardware.SensorManager.registerListener com.trick.caution -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.trick.cautiondescription ioc Process File opened for read /proc/cpuinfo com.trick.caution -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.trick.cautiondescription ioc Process File opened for read /proc/meminfo com.trick.caution
Processes
-
com.trick.caution1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4491
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD58d47a330ea0c3b85b79ef7be01d91038
SHA14bc900bca1dbf260325f75aea8e959598f3ab42d
SHA25673966cc69c294785a97a927fcd25759550b04b71002a37991492f1ecd1804781
SHA5121d96ccdb2b7612b8d1f116c9d628d33813d3a385abb53f0d7fb6f63cbb359fe1be8383c47b26e15fc7f8d764c5c3f7af209ac344e07554566bc82145bfb63a3c
-
Filesize
64KB
MD51c0d6fcf5bf5ea22740e29ddd03f963a
SHA14cb64e8eee15e10e4c7af721c9c85ea1e188446a
SHA256f982900969f8e86e637d1fea740c3954d7a99db0da3464214c1b612d2c15a249
SHA512c2cdbd62d8307bc0bf5d57eef16ea93a4419f3842eeb0828376ec952f2d648c07b5fb29eee2856ea0e4887cf1bb3cef580ba7ea9122f724df236f230349cb8cb
-
Filesize
118KB
MD508f818e7b9a7b3d91d0c64db2adfe623
SHA11e17fc5a6bd7d29307dd04df8bbc4edeb9680e1e
SHA256252acf5a3ea28210b475900263cc192c3422984522b5e7e50e7ac18bd2e579e9
SHA5126177922b522f05f44ad45c82d9719bf718e9bf44fcd8354f01339feb0ccf657d5ffcc4060cd37544f116ad55e28c3a64b31f31ab5b2613a935229d595fbcfa36
-
Filesize
152B
MD5ed31f35549085e653519f12999845573
SHA1569d699bc9d0a8f35fc3f71115a7f163a69fa9e9
SHA256b5e4b09b626c05274d93c815fdf05ef552a8a9eea397c136706187372b4c4afe
SHA512e39dbc30f592cc35c53721378e106604bd42515e39faf9098fd014935db6c8dbaf06c6f9ef66ff66a15a2c17147b0f0a43acfc0d6da5cf97d56f3b1af17fa90e