Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
18/01/2025, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
-
Size
1.5MB
-
MD5
a78bf373c2c15968e62ebb3318983d36
-
SHA1
c5ba84594c2880c42826d56fcad4a01cd4ba958c
-
SHA256
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9
-
SHA512
7f5aab2a4ae23c1034790aa1d54a2addaa5491a7a7158617ef0fd4377b2a5b050fb72fc833ccdde6bd495c4728457669786b87c78ce10f94bcccd97748d4e2f9
-
SSDEEP
24576:B8qSi0R8g3097jprmXunEw+6c/E6CH0MGgJZ99Vb0X9LofIbx343siMZMMGp0xAH:LprEunEws/E6CH0MGWZHVbELVR4aWH0E
Malware Config
Extracted
cerberus
http://62.109.13.217/
Signatures
-
Cerberus family
-
pid Process 5236 com.neither.gym 5236 com.neither.gym -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json 5236 com.neither.gym -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.neither.gym Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.neither.gym Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.neither.gym -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.neither.gym -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.neither.gym -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.neither.gym -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.neither.gym -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.neither.gym -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.neither.gym
Processes
-
com.neither.gym1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:5236
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59ee5d95e058633c875c141446592a722
SHA1bbb0486d9de29f5429a873d2e1627813c228447c
SHA256d134d7b805f67ed05f1caccdca35aaec06dbe1f424dab48a0e9b896fa37fc621
SHA512dc1b5ef057be6bcca4bcd43b6bc9fbc321c771e16b4f9ad30b199659a89dddc3245cddda6febd45b579059f57baceb5daa15475defcf0397e3cd812c9093a956
-
Filesize
64KB
MD5110202b5ce42b3969c51698b838b9ad7
SHA178ad6063fdd4d7be0b581e382911fb86ff814f43
SHA2563001b05c0b0a4437aaa53f25354cb33baead8318c3adb3f981627247cb02178f
SHA51265022ef0df30e85422d7a779965bdb5463cad78fe3ca2a0d233ffcdce7c3eb8d82af3cfcb834e76c68b8ff8ee43c6968936cc1e7a36d67bf98310720852b3f7d
-
Filesize
118KB
MD54c547b8533f6d0c8b84a52f8fbc4ad13
SHA1d8be8c20aca6d7a9348e221ad213555afcddb7e6
SHA25602d27d45c00f8af66aa0137dea77072fba44d0fe2aa6dd7d09106442df9e805d
SHA5126e1de7950ef6df1b0fe088d74b225fed8097abc917bf37ef9305fed5261b3908d3907ce37cd8a0dbb72f7d5e3f4dc231892853914b6077d659fee9d8d9a6f151