Analysis
-
max time kernel
84s -
max time network
142s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
25-11-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674.apk
-
Size
2.4MB
-
MD5
8c59c1f7f439fe1e38bcad4c3e093380
-
SHA1
d4d88e2f8d612f2b9aa7e51123d8b0647b6c9ccc
-
SHA256
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674
-
SHA512
607bb4c5b04094c2d913de59b972d1e49fe44e2964b16470e9a60c36c46c74cc0e688d184aa184c5e2d2437729bb19d2a79b50a5d2b338e60a6b60bb9f1b24e2
-
SSDEEP
49152:xKq8/38BaoDaJ9Si1QE/FpGYWNm+11vuzE5Gtwcp8RU1:UPloDaJ9rKNmI1vuz4Gicp8RU1
Malware Config
Extracted
cerberus
http://45.67.35.46/
Signatures
-
Cerberus family
-
pid Process 4270 com.brdnpufwm.fpemtlcca 4270 com.brdnpufwm.fpemtlcca -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.brdnpufwm.fpemtlcca/app_app_dex/hilelfo.epf 4270 com.brdnpufwm.fpemtlcca /data/user/0/com.brdnpufwm.fpemtlcca/app_app_dex/hilelfo.epf 4297 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.brdnpufwm.fpemtlcca/app_app_dex/hilelfo.epf --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.brdnpufwm.fpemtlcca/app_app_dex/oat/x86/hilelfo.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.brdnpufwm.fpemtlcca/app_app_dex/hilelfo.epf 4270 com.brdnpufwm.fpemtlcca -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.brdnpufwm.fpemtlcca Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.brdnpufwm.fpemtlcca Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.brdnpufwm.fpemtlcca -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.brdnpufwm.fpemtlcca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.brdnpufwm.fpemtlcca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.brdnpufwm.fpemtlcca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.brdnpufwm.fpemtlcca -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.brdnpufwm.fpemtlcca -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.brdnpufwm.fpemtlcca -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.brdnpufwm.fpemtlcca -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.brdnpufwm.fpemtlcca -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.brdnpufwm.fpemtlcca -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.brdnpufwm.fpemtlcca -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.brdnpufwm.fpemtlcca -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.brdnpufwm.fpemtlcca
Processes
-
com.brdnpufwm.fpemtlcca1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4270 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.brdnpufwm.fpemtlcca/app_app_dex/hilelfo.epf --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.brdnpufwm.fpemtlcca/app_app_dex/oat/x86/hilelfo.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4297
-
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD57962d657f47197f8705502d04b081474
SHA14637e409b551c87e13757bd2f4e087714944b4a3
SHA2564b13c59baf81e423fcc9d1cf23cd2cebff417fa2ba728d5c89278a6ed13d1123
SHA512427b2cda6f4759ba4014098ac5849c05cf7f5ecc7190347314f389de7d64be6210bf46f07471c22a362d8f4ca0fabd604e199d7d2878a65bc09b72b23e81c6a7
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
198KB
MD56ee5d66899f687ed3d272a2e7a99d9b5
SHA11b447cf0392007585e0a121d57075f7b2dfdc03e
SHA256202caaed8a531a5dede3e69b473228134149a53083bbf2a65d5005354a7bc4a0
SHA51261c5821e1f8201f0f9459ff5f40a29fe478082870128c5e1c0a4156859fe7b98c08f9746e3da0c429e5aff51d35600e9176ef32a8b5ffb9bb806587ebf477ab6