Analysis
-
max time kernel
77s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
07-01-2025 22:09
Static task
static1
Behavioral task
behavioral1
Sample
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51.apk
-
Size
1.6MB
-
MD5
c63a29d9a5a2658647745b5c85b93d6a
-
SHA1
4f7964878de95149893301528919b627b9ce33b1
-
SHA256
60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51
-
SHA512
897addf559aa9df246ce1cf8d340f6d0647a8780160e98f3f7c8e6d06c1d40093b43abdae2d239ed3af55e7c0c64707c24f9fc83eb7b7015bc1510a2f9db42d0
-
SSDEEP
49152:lGt5jc6hwbrAGR+w88gm0MElmXpK565Hvp/mq+h4LMp:lGt5jbhwn9+mglmXsMWq+GQp
Malware Config
Extracted
cerberus
http://188.120.228.245/
Signatures
-
Cerberus family
-
pid Process 4961 com.spare.lecture 4961 com.spare.lecture -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.spare.lecture/app_DynamicOptDex/shp.json 4961 com.spare.lecture -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.spare.lecture Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.spare.lecture Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.spare.lecture -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.spare.lecture -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.spare.lecture android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.spare.lecture android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.spare.lecture android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.spare.lecture -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.spare.lecture -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.spare.lecture -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.spare.lecture -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.spare.lecture -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.spare.lecture
Processes
-
com.spare.lecture1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4961
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD5fc1344500a9cbc8926a81c506ba6ae17
SHA179ce22caceb790534c6a0c3e774cd8ab48f53002
SHA2569c3a449fa198f557b852e9a697bd2f9b3aa3481cfcadc0054c9043f81111e5e8
SHA51212ca0c4a7a3a8c8af520f1f92a09383464b33ad94b7c8782ffb9ee7938ba555981f1c8d70937002ceef55dd6b8c2b408893f2c056a500119ebbd3d579bea822f
-
Filesize
64KB
MD535e9ec8984392ac9edc652a6c930f49e
SHA1346595f9977fe080c8ecc2c9602406399e02e102
SHA256ee6644faf111511d506c250fac1e71b470ebda2cde61fb24917e8d208e2b6e69
SHA512f065158220f83fdc6f107e19e14ca49522b551ce64b76d9d325943231c963fefd5c97940d266a8747d8b8ff41962f11edc455375dac8d6dabffbaaebe89010f7
-
Filesize
64KB
MD585279048561181955f45e15abf9ac7c6
SHA1847c7eec7a63090ecc9efebe5a424efab39e7abc
SHA2564d9463600c3c0302e642bea431bf5106948a5d2a43c925a8d3b454de51c96e24
SHA512fa424e441fd4a9455cc0eba7fa4e18b2a7432e1ee05986d1401c539a6ae7f71b6e57b3c7100da083fc92ec02a446c1d4141cb140aabd0cbc214caee4d0e8fbb5
-
Filesize
118KB
MD526fa0f83291d4580e90abd9afbe8801f
SHA1909d65523a0ec26f954c90ad99ad32317283b7be
SHA25608a2c2ddeea69bad4702f1ba127c8846ff989cb51b5fc21ee0e71b7df826f64a
SHA5121e0bd965bac4933b5fc85982a4533e8e8ce595469aaef6639d5d63d25bf2e65d367a24023d724f625be2fdc3e9d49107b01ca8fe57791572f24fc3237412164d