Analysis
-
max time kernel
119s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
17-12-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7.apk
-
Size
1.7MB
-
MD5
81ed419043f1fc684269bde2dbb54ea9
-
SHA1
64812a027ecc84c8df29520d61bcbb11ae861c69
-
SHA256
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7
-
SHA512
e13dc288cde1b8d40cf745fb9bdfa3694d6da89c928310835fdd1701ea904583cf290c61e6bf8a9b70da24e25e9666e5601e58a46f0d9581303c8fca6382caa2
-
SSDEEP
24576:8Smy29rF4HkRXZcq65Mneo45BHe7c4g5X6t1yZeOMeMVvwNKm3kqXSpLB473DOxs:8Smy2HsKZnej5c73g5X0y6F6NKyWLScs
Malware Config
Extracted
cerberus
http://188.120.236.119/
Signatures
-
Cerberus family
-
pid Process 4276 com.kingdom.become 4276 com.kingdom.become -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.kingdom.become/app_DynamicOptDex/SUETT.json 4301 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.kingdom.become/app_DynamicOptDex/SUETT.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.kingdom.become/app_DynamicOptDex/oat/x86/SUETT.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.kingdom.become/app_DynamicOptDex/SUETT.json 4276 com.kingdom.become -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.kingdom.become Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.kingdom.become Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.kingdom.become -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kingdom.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kingdom.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kingdom.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kingdom.become -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.kingdom.become -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.kingdom.become -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.kingdom.become -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.kingdom.become -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.kingdom.become -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.kingdom.become -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.kingdom.become -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.kingdom.become
Processes
-
com.kingdom.become1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4276 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.kingdom.become/app_DynamicOptDex/SUETT.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.kingdom.become/app_DynamicOptDex/oat/x86/SUETT.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4301
-
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5fd9dcb27bc0f299e77dd1fb7f47c9814
SHA15395f30f17efe1d45dcbd93b53f8785c0f3cb736
SHA256ea3fb890a991d5a6822d655d6b4045d5d091585aa1d2371e274fc74cc9e589b5
SHA51215025c0bf42f50046f8163e09ef99e16fcb12342b07f355284c04c6e0d1522976d6e4ec9887a3a468d7c12dbb25a9813b757f1aa527c3789c016f6efb28eae6a
-
Filesize
64KB
MD56800e18b0953484de6c45435e5b57e78
SHA156a12ee07bc4fdd5ad5bc1858f4829b1041f3c9d
SHA256c6b0d429d35ef2b8f2610d46282261a58495abde483fa3b150d67f72ef7a84fa
SHA5126f37bac9a91dc6aae793149eccc10ca25010c926e97f7b4ddc4ed9ab4a543570eb83fe18fc3bb0019477646a5bea1b6dc54e29e703d6480fb90f92473d44e411
-
Filesize
210B
MD5c4794a37ea3fd830d621e1bfbe4d33e9
SHA1405c886c9a08fdc8fe2033c7c9c04b2742a8243f
SHA2562c5701cfa8743888ac86a54ab2edc9ebe44afcf790e0e644d92d96a1221526ea
SHA51255f86d6999a8537b2949a23ce327ced6d34b4f7aae53a5c43d171d9889edfedabe1f862cc95d426ad24fed1cea119478c6f9f5d9cb177abfc4ffad2c6287ae53
-
Filesize
118KB
MD536a3599cb0e3362740e52aaa6b26559a
SHA19233cf74d30378b0220ddca8749e5afc77a664a0
SHA2561e49d0a2c8285a660574d2e3da785df9ae6a566e6a222474ed08ebe2fc8760ec
SHA51226b5b502ea97fec4d4e8aeb3879d58272d167731d99c1a0ec880c7e58ffd866e6fe8f463e8a4ff018a27de3b5208adb3350f8a87451f47851f0e436cd7c8388f
-
Filesize
118KB
MD5d3a1e2a92c440d9a1127ed0df9d6a87f
SHA1a81c6f74437911ddcf9cea3e3f4bfce579d7d07d
SHA256c19624de740dee2572875175e52756ec38803d9a818091aa0228e880e5f79a87
SHA512a6805b109027c00cf94d76a5cd1a15980a792a16d6b60cd00e23bdc9d8579c50460b8e1fde29127aa4c0660bd0e808518359f948ec1c6ddea14c29407ea9d703