Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
18/01/2025, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
-
Size
1.5MB
-
MD5
a78bf373c2c15968e62ebb3318983d36
-
SHA1
c5ba84594c2880c42826d56fcad4a01cd4ba958c
-
SHA256
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9
-
SHA512
7f5aab2a4ae23c1034790aa1d54a2addaa5491a7a7158617ef0fd4377b2a5b050fb72fc833ccdde6bd495c4728457669786b87c78ce10f94bcccd97748d4e2f9
-
SSDEEP
24576:B8qSi0R8g3097jprmXunEw+6c/E6CH0MGgJZ99Vb0X9LofIbx343siMZMMGp0xAH:LprEunEws/E6CH0MGWZHVbELVR4aWH0E
Malware Config
Extracted
cerberus
http://62.109.13.217/
Signatures
-
Cerberus family
-
pid Process 4256 com.neither.gym 4256 com.neither.gym -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json 4281 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.neither.gym/app_DynamicOptDex/oat/x86/LFYTpH.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json 4256 com.neither.gym -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.neither.gym Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.neither.gym Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.neither.gym -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.neither.gym -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.neither.gym -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.neither.gym -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.neither.gym -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.neither.gym -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.neither.gym -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.neither.gym
Processes
-
com.neither.gym1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4256 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.neither.gym/app_DynamicOptDex/oat/x86/LFYTpH.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4281
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59ee5d95e058633c875c141446592a722
SHA1bbb0486d9de29f5429a873d2e1627813c228447c
SHA256d134d7b805f67ed05f1caccdca35aaec06dbe1f424dab48a0e9b896fa37fc621
SHA512dc1b5ef057be6bcca4bcd43b6bc9fbc321c771e16b4f9ad30b199659a89dddc3245cddda6febd45b579059f57baceb5daa15475defcf0397e3cd812c9093a956
-
Filesize
64KB
MD5110202b5ce42b3969c51698b838b9ad7
SHA178ad6063fdd4d7be0b581e382911fb86ff814f43
SHA2563001b05c0b0a4437aaa53f25354cb33baead8318c3adb3f981627247cb02178f
SHA51265022ef0df30e85422d7a779965bdb5463cad78fe3ca2a0d233ffcdce7c3eb8d82af3cfcb834e76c68b8ff8ee43c6968936cc1e7a36d67bf98310720852b3f7d
-
Filesize
240B
MD56e92aaf5cdd415d2c20898a1962aa46b
SHA199eb68f4e0851bb417b52591a1085d1f1da1083b
SHA2562e055c9211409657af026d8c0bb0f8393915f00fcc164d3f576f68b177ba5ab7
SHA512d27cd19d857bafd73204823e3dbe99126f77298067c99b9d26f8db7b4a81ad437e3c7c0d2318bce4bd5435b66e656e2126f9eaa5b39ec320e072db661b36900a
-
Filesize
118KB
MD508bd88dd5903ca14972c52cc5f893253
SHA1e45453a3909f393567e5c95a27e175717d0adfef
SHA2562774d6a67dba2e13e6460430297b68fd5bc2f1b8d000094eeec79bb2c45aed10
SHA5125fb306c8f79a743f408abc24817c72830e6239eba7341f142959a74db084ad2991bfa6c9e2fbcdf38d260991e2da86cc4a6f12f94c546b4e1d52f3454ac67192
-
Filesize
118KB
MD54c547b8533f6d0c8b84a52f8fbc4ad13
SHA1d8be8c20aca6d7a9348e221ad213555afcddb7e6
SHA25602d27d45c00f8af66aa0137dea77072fba44d0fe2aa6dd7d09106442df9e805d
SHA5126e1de7950ef6df1b0fe088d74b225fed8097abc917bf37ef9305fed5261b3908d3907ce37cd8a0dbb72f7d5e3f4dc231892853914b6077d659fee9d8d9a6f151