Analysis

  • max time kernel
    37s
  • max time network
    150s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    07-01-2025 22:09

General

  • Target

    60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51.apk

  • Size

    1.6MB

  • MD5

    c63a29d9a5a2658647745b5c85b93d6a

  • SHA1

    4f7964878de95149893301528919b627b9ce33b1

  • SHA256

    60f109c8e2e904faaf663dcad5ff23b9e68c4f84c77c78350b637a92cfb4cf51

  • SHA512

    897addf559aa9df246ce1cf8d340f6d0647a8780160e98f3f7c8e6d06c1d40093b43abdae2d239ed3af55e7c0c64707c24f9fc83eb7b7015bc1510a2f9db42d0

  • SSDEEP

    49152:lGt5jc6hwbrAGR+w88gm0MElmXpK565Hvp/mq+h4LMp:lGt5jbhwn9+mglmXsMWq+GQp

Malware Config

Extracted

Family

cerberus

C2

http://188.120.228.245/

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus family
  • Removes its main activity from the application launcher 1 TTPs 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Requests changing the default SMS application. 2 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.spare.lecture
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Performs UI accessibility actions on behalf of the user
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Listens for changes in the sensor environment (might be used to detect emulation)
    • Checks CPU information
    • Checks memory information
    PID:4769

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.spare.lecture/app_DynamicOptDex/shp.json

    Filesize

    64KB

    MD5

    35e9ec8984392ac9edc652a6c930f49e

    SHA1

    346595f9977fe080c8ecc2c9602406399e02e102

    SHA256

    ee6644faf111511d506c250fac1e71b470ebda2cde61fb24917e8d208e2b6e69

    SHA512

    f065158220f83fdc6f107e19e14ca49522b551ce64b76d9d325943231c963fefd5c97940d266a8747d8b8ff41962f11edc455375dac8d6dabffbaaebe89010f7

  • /data/user/0/com.spare.lecture/app_DynamicOptDex/shp.json

    Filesize

    64KB

    MD5

    85279048561181955f45e15abf9ac7c6

    SHA1

    847c7eec7a63090ecc9efebe5a424efab39e7abc

    SHA256

    4d9463600c3c0302e642bea431bf5106948a5d2a43c925a8d3b454de51c96e24

    SHA512

    fa424e441fd4a9455cc0eba7fa4e18b2a7432e1ee05986d1401c539a6ae7f71b6e57b3c7100da083fc92ec02a446c1d4141cb140aabd0cbc214caee4d0e8fbb5

  • /data/user/0/com.spare.lecture/app_DynamicOptDex/shp.json

    Filesize

    118KB

    MD5

    26fa0f83291d4580e90abd9afbe8801f

    SHA1

    909d65523a0ec26f954c90ad99ad32317283b7be

    SHA256

    08a2c2ddeea69bad4702f1ba127c8846ff989cb51b5fc21ee0e71b7df826f64a

    SHA512

    1e0bd965bac4933b5fc85982a4533e8e8ce595469aaef6639d5d63d25bf2e65d367a24023d724f625be2fdc3e9d49107b01ca8fe57791572f24fc3237412164d