Analysis
-
max time kernel
64s -
max time network
160s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
16-01-2025 22:04
Static task
static1
Behavioral task
behavioral1
Sample
c52cba75b5bdc67fb39b8462c2c11b9efa48e5c0a02e6f176e8d5ef83268c19d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
c52cba75b5bdc67fb39b8462c2c11b9efa48e5c0a02e6f176e8d5ef83268c19d.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
c52cba75b5bdc67fb39b8462c2c11b9efa48e5c0a02e6f176e8d5ef83268c19d.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
c52cba75b5bdc67fb39b8462c2c11b9efa48e5c0a02e6f176e8d5ef83268c19d.apk
-
Size
1.4MB
-
MD5
920e016f88be0bebbb1efdc9dfd09dcc
-
SHA1
ce4f0251be0bfade89eed7cec87ce938406780db
-
SHA256
c52cba75b5bdc67fb39b8462c2c11b9efa48e5c0a02e6f176e8d5ef83268c19d
-
SHA512
7c0ae66cefff521fea20557463beb592865b140e91eaf56f72a833d97b351707764162d1721ed8774f1024f849c4c305c1a8ae8d1fda133562d5bcec70540127
-
SSDEEP
24576:NaphSMT100tsz9jCeN9MseZSl7h2Rymh9pa/Nxz7TteUaQUaWynAzn1kBG5uptr4:NabPszwZSl9MpzUXP8UaQUaWzzn1aGU4
Malware Config
Extracted
cerberus
http://apiv1android.cf
Signatures
-
Cerberus family
-
pid Process 4594 com.reunion.start -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.reunion.start/app_DynamicOptDex/jdFM.json 4594 com.reunion.start -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.reunion.start Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.reunion.start -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.reunion.start -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.reunion.start android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.reunion.start android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.reunion.start android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.reunion.start -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.reunion.start -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.reunion.start -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.reunion.start -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.reunion.start -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.reunion.start
Processes
-
com.reunion.start1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4594
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5e95a584ae65b98137fd55a42a98399ab
SHA187bcda849a81fc61e441af79f1ce9f28bb760c35
SHA2565fbc3003264cf81aa6fa34d63aee5c0f2cd125b88c2ea6c207db898867a92152
SHA512f219d46919744eff77d6199efe7ae81d286af2c83a605f27e2548e1b64cdabd2128086fb6b229b4fd0cf0e340d21e4b09f2a43f254f7c9c833a5d5fc34da223d
-
Filesize
64KB
MD5cf35f1f6e17bd320e44083a8c1b33186
SHA1b990f5b2c4ad37b2e208a95e03174c00d5a59448
SHA256ab8c79b4cfd2d019c58bbb25b659a8076a24a037e51fd3e23a065f0b4ee1049e
SHA512a2d0e04b01362a0d5ed9dbe0c8134b6adb805ed3983136d56e1bf0bb45592c40a16d4be8cfe6c4e73dc5ece3bb06cbf6eb93638aa19e6e5b40a0c92f5164eefb
-
Filesize
164B
MD5fafe1a14297949c57206a353d4b8c6f4
SHA1fd027197b98c745066eb17956f4d70eb4897838a
SHA2566fca0b2414f65cb2d38841ecb4885bb7c6cb1239c15cd59e8e0403b9ae6daafe
SHA51200e42ede26b29c54dfd768a1cf4519b708c5441cee0de5b5e0e7cf1edc9ccec9aa5dec71e96a4bafb10d35767a4effb3a0ae7d9c24b1a5be167b615e502b898d
-
Filesize
125KB
MD541b9220653399f4fee8abc651a6ca9a0
SHA18f21740596a9d05931753db569d11eda5be48f0a
SHA2568650c0cc23b684220d3bc076b9074f001487319d07931402b5e484e4a946c760
SHA5129107f18239d9f3f4513284c9b9d7be955d0c9a81fd42414972520efd13b01c38a2c6f6c5ad103e37f43a9ae9aafc0f9875e68cae9e87492b720bd633f98db71d