Analysis
-
max time kernel
45s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
17-12-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7.apk
-
Size
1.7MB
-
MD5
81ed419043f1fc684269bde2dbb54ea9
-
SHA1
64812a027ecc84c8df29520d61bcbb11ae861c69
-
SHA256
879884caca67b19832cf518c802140fe8aa00bda50d94c8cbf6c981c1f34b6e7
-
SHA512
e13dc288cde1b8d40cf745fb9bdfa3694d6da89c928310835fdd1701ea904583cf290c61e6bf8a9b70da24e25e9666e5601e58a46f0d9581303c8fca6382caa2
-
SSDEEP
24576:8Smy29rF4HkRXZcq65Mneo45BHe7c4g5X6t1yZeOMeMVvwNKm3kqXSpLB473DOxs:8Smy2HsKZnej5c73g5X0y6F6NKyWLScs
Malware Config
Extracted
cerberus
http://188.120.236.119/
Signatures
-
Cerberus family
-
pid Process 4774 com.kingdom.become 4774 com.kingdom.become -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.kingdom.become/app_DynamicOptDex/SUETT.json 4774 com.kingdom.become [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.kingdom.become/app_DynamicOptDex/SUETT.json] 4774 com.kingdom.become [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.kingdom.become/app_DynamicOptDex/SUETT.json] 4774 com.kingdom.become -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.kingdom.become Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.kingdom.become Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.kingdom.become -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.kingdom.become -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kingdom.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kingdom.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kingdom.become android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.kingdom.become -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.kingdom.become -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.kingdom.become -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.kingdom.become -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.kingdom.become -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.kingdom.become
Processes
-
com.kingdom.become1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4774
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5fd9dcb27bc0f299e77dd1fb7f47c9814
SHA15395f30f17efe1d45dcbd93b53f8785c0f3cb736
SHA256ea3fb890a991d5a6822d655d6b4045d5d091585aa1d2371e274fc74cc9e589b5
SHA51215025c0bf42f50046f8163e09ef99e16fcb12342b07f355284c04c6e0d1522976d6e4ec9887a3a468d7c12dbb25a9813b757f1aa527c3789c016f6efb28eae6a
-
Filesize
64KB
MD56800e18b0953484de6c45435e5b57e78
SHA156a12ee07bc4fdd5ad5bc1858f4829b1041f3c9d
SHA256c6b0d429d35ef2b8f2610d46282261a58495abde483fa3b150d67f72ef7a84fa
SHA5126f37bac9a91dc6aae793149eccc10ca25010c926e97f7b4ddc4ed9ab4a543570eb83fe18fc3bb0019477646a5bea1b6dc54e29e703d6480fb90f92473d44e411
-
Filesize
118KB
MD5d3a1e2a92c440d9a1127ed0df9d6a87f
SHA1a81c6f74437911ddcf9cea3e3f4bfce579d7d07d
SHA256c19624de740dee2572875175e52756ec38803d9a818091aa0228e880e5f79a87
SHA512a6805b109027c00cf94d76a5cd1a15980a792a16d6b60cd00e23bdc9d8579c50460b8e1fde29127aa4c0660bd0e808518359f948ec1c6ddea14c29407ea9d703
-
Filesize
150B
MD5f2ce33e2cb1a4e4ab886e6fac957e35c
SHA1bc9d936c2ba9154ff73e759748dbae247bb6a0c2
SHA256cacb3226cb9d48ffab35cd39829c6808426f475a664426c0f11bd3fa08343e91
SHA5126b0ea108b2e973890261e72c8b5f9eab9a7bf35256cd7f6ef056c6eb77f6f461b6f8ac8eb22f0105a7be2edbf91c682309e801a7ec54b03cdfea9e1be07658a6