Analysis
-
max time kernel
57s -
max time network
150s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
25-11-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674.apk
-
Size
2.4MB
-
MD5
8c59c1f7f439fe1e38bcad4c3e093380
-
SHA1
d4d88e2f8d612f2b9aa7e51123d8b0647b6c9ccc
-
SHA256
bcce8721d78e9511a26be495b1f40af393a742aaba3f841d86c029c2b8a82674
-
SHA512
607bb4c5b04094c2d913de59b972d1e49fe44e2964b16470e9a60c36c46c74cc0e688d184aa184c5e2d2437729bb19d2a79b50a5d2b338e60a6b60bb9f1b24e2
-
SSDEEP
49152:xKq8/38BaoDaJ9Si1QE/FpGYWNm+11vuzE5Gtwcp8RU1:UPloDaJ9rKNmI1vuz4Gicp8RU1
Malware Config
Extracted
cerberus
http://45.67.35.46/
Signatures
-
Cerberus family
-
pid Process 4609 com.brdnpufwm.fpemtlcca 4609 com.brdnpufwm.fpemtlcca -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.brdnpufwm.fpemtlcca/app_app_dex/hilelfo.epf 4609 com.brdnpufwm.fpemtlcca /data/user/0/com.brdnpufwm.fpemtlcca/app_app_dex/hilelfo.epf 4609 com.brdnpufwm.fpemtlcca -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.brdnpufwm.fpemtlcca Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.brdnpufwm.fpemtlcca Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.brdnpufwm.fpemtlcca -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.brdnpufwm.fpemtlcca -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.brdnpufwm.fpemtlcca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.brdnpufwm.fpemtlcca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.brdnpufwm.fpemtlcca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.brdnpufwm.fpemtlcca -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.brdnpufwm.fpemtlcca -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.brdnpufwm.fpemtlcca -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.brdnpufwm.fpemtlcca -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.brdnpufwm.fpemtlcca -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.brdnpufwm.fpemtlcca -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.brdnpufwm.fpemtlcca
Processes
-
com.brdnpufwm.fpemtlcca1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4609
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD57962d657f47197f8705502d04b081474
SHA14637e409b551c87e13757bd2f4e087714944b4a3
SHA2564b13c59baf81e423fcc9d1cf23cd2cebff417fa2ba728d5c89278a6ed13d1123
SHA512427b2cda6f4759ba4014098ac5849c05cf7f5ecc7190347314f389de7d64be6210bf46f07471c22a362d8f4ca0fabd604e199d7d2878a65bc09b72b23e81c6a7
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f