Analysis
-
max time kernel
132s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
07-01-2025 22:09
Static task
static1
Behavioral task
behavioral1
Sample
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51.apk
-
Size
1.6MB
-
MD5
c63a29d9a5a2658647745b5c85b93d6a
-
SHA1
4f7964878de95149893301528919b627b9ce33b1
-
SHA256
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51
-
SHA512
897addf559aa9df246ce1cf8d340f6d0647a8780160e98f3f7c8e6d06c1d40093b43abdae2d239ed3af55e7c0c64707c24f9fc83eb7b7015bc1510a2f9db42d0
-
SSDEEP
49152:lGt5jc6hwbrAGR+w88gm0MElmXpK565Hvp/mq+h4LMp:lGt5jbhwn9+mglmXsMWq+GQp
Malware Config
Extracted
cerberus
http://188.120.228.245/
Signatures
-
Cerberus family
-
pid Process 4216 com.spare.lecture 4216 com.spare.lecture -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.spare.lecture/app_DynamicOptDex/shp.json 4241 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.spare.lecture/app_DynamicOptDex/shp.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.spare.lecture/app_DynamicOptDex/oat/x86/shp.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.spare.lecture/app_DynamicOptDex/shp.json 4216 com.spare.lecture -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.spare.lecture Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.spare.lecture Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.spare.lecture -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.spare.lecture android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.spare.lecture android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.spare.lecture android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.spare.lecture -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.spare.lecture -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.spare.lecture -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.spare.lecture -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.spare.lecture -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.spare.lecture -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.spare.lecture -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.spare.lecture -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.spare.lecture
Processes
-
com.spare.lecture1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4216 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.spare.lecture/app_DynamicOptDex/shp.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.spare.lecture/app_DynamicOptDex/oat/x86/shp.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4241
-
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD5e1497a2c6218a3c0792bdce7ea55c09e
SHA1f4232c8775e7f74e2bed902059daec1a6ea0dc3c
SHA2564fddd3122fb2abcbcdacbe6a3ab904b0df364b4a816940a75e6da0540e3e994d
SHA51294ddf6790ecb414ff078882f89153f968bda6c36077a18cbf3dd73ec1694d3ff13081f54f42576424e3ad0363c7ba6c09f57e3eee5e985c4f412056530b167dd
-
Filesize
64KB
MD535e9ec8984392ac9edc652a6c930f49e
SHA1346595f9977fe080c8ecc2c9602406399e02e102
SHA256ee6644faf111511d506c250fac1e71b470ebda2cde61fb24917e8d208e2b6e69
SHA512f065158220f83fdc6f107e19e14ca49522b551ce64b76d9d325943231c963fefd5c97940d266a8747d8b8ff41962f11edc455375dac8d6dabffbaaebe89010f7
-
Filesize
64KB
MD585279048561181955f45e15abf9ac7c6
SHA1847c7eec7a63090ecc9efebe5a424efab39e7abc
SHA2564d9463600c3c0302e642bea431bf5106948a5d2a43c925a8d3b454de51c96e24
SHA512fa424e441fd4a9455cc0eba7fa4e18b2a7432e1ee05986d1401c539a6ae7f71b6e57b3c7100da083fc92ec02a446c1d4141cb140aabd0cbc214caee4d0e8fbb5
-
Filesize
118KB
MD5c5ce525295a731f5603be67c2c145d83
SHA1404b753930aab8dbda9bdb3f223a35b35e3af484
SHA256631718d8722a79d404acea74667da0f3b6c7a06836287fb6bd4ba41d2ac92afb
SHA512d182b102c4e0e8237895af3e49bdc113bba0531b8d6ea4f28cfed0e74ca2dcdbf73d1c649868770932cb1a1f6c4d544ae879f08ce9ddd12a38e3eecfc4196b9d
-
Filesize
118KB
MD526fa0f83291d4580e90abd9afbe8801f
SHA1909d65523a0ec26f954c90ad99ad32317283b7be
SHA25608a2c2ddeea69bad4702f1ba127c8846ff989cb51b5fc21ee0e71b7df826f64a
SHA5121e0bd965bac4933b5fc85982a4533e8e8ce595469aaef6639d5d63d25bf2e65d367a24023d724f625be2fdc3e9d49107b01ca8fe57791572f24fc3237412164d