Analysis
-
max time kernel
49s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
03-12-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
f7a2976b4f815408f29c97d6476563a271388c386bd651cf26c02addb867087b.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
f7a2976b4f815408f29c97d6476563a271388c386bd651cf26c02addb867087b.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
f7a2976b4f815408f29c97d6476563a271388c386bd651cf26c02addb867087b.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f7a2976b4f815408f29c97d6476563a271388c386bd651cf26c02addb867087b.apk
-
Size
2.7MB
-
MD5
824f4ad2d5bee740a3fe97db2d769f7b
-
SHA1
28ddc20ebb3a671c2776ce5855917597f2ff91f7
-
SHA256
f7a2976b4f815408f29c97d6476563a271388c386bd651cf26c02addb867087b
-
SHA512
1e7e4d36a264d527c98b1ac58cb4e0a7b66be337db1c74f5df000d12c613533b4b21450a36857322f87a1df6906b1fc1409843c0d2e0bccc720cb8a13d49236d
-
SSDEEP
49152:OD6a1Kn9iEmMAzh/qeZQO+SA3zp3m1gDw14znLmAQgxWWjcd:88PrA3Zvt1AbDQE8
Malware Config
Extracted
cerberus
http://tfsmrfs.ru/
Signatures
-
Cerberus family
-
pid Process 4622 com.olhrkwvpe.zazvqzznb 4622 com.olhrkwvpe.zazvqzznb -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.olhrkwvpe.zazvqzznb/app_app_dex/cnooisg.qdl 4622 com.olhrkwvpe.zazvqzznb /data/user/0/com.olhrkwvpe.zazvqzznb/app_app_dex/cnooisg.qdl 4622 com.olhrkwvpe.zazvqzznb /data/user/0/com.olhrkwvpe.zazvqzznb/app_app_dex/cnooisg.qdl (deleted) 4622 com.olhrkwvpe.zazvqzznb /data/user/0/com.olhrkwvpe.zazvqzznb/app_app_dex/cnooisg.qdl (deleted) 4622 com.olhrkwvpe.zazvqzznb -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.olhrkwvpe.zazvqzznb Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.olhrkwvpe.zazvqzznb Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.olhrkwvpe.zazvqzznb -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.olhrkwvpe.zazvqzznb -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.olhrkwvpe.zazvqzznb android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.olhrkwvpe.zazvqzznb android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.olhrkwvpe.zazvqzznb android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.olhrkwvpe.zazvqzznb -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.olhrkwvpe.zazvqzznb -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.olhrkwvpe.zazvqzznb -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.olhrkwvpe.zazvqzznb -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.olhrkwvpe.zazvqzznb -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.olhrkwvpe.zazvqzznb -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.olhrkwvpe.zazvqzznb
Processes
-
com.olhrkwvpe.zazvqzznb1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4622
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5b4b363c197cfd9c7ea2a2cec0b0af62a
SHA1935eed2a57293b8ca101d15c86a9f4e90228cf17
SHA256df4dae7cbcf39c2fa2db0614f5f2691390618e7f269e0bb2619a8d03de44a2de
SHA51242e3351f62514c00ce222ccc3ffa1752d070d293c18a5f5f830b29e751a0f72290a516a7c5190bbb5a77be544102af6994732e7275c5b5594b11ddf51d0af4b4
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f