Analysis
-
max time kernel
54s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
18-01-2025 22:11
Static task
static1
Behavioral task
behavioral1
Sample
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk
-
Size
1.5MB
-
MD5
a78bf373c2c15968e62ebb3318983d36
-
SHA1
c5ba84594c2880c42826d56fcad4a01cd4ba958c
-
SHA256
7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9
-
SHA512
7f5aab2a4ae23c1034790aa1d54a2addaa5491a7a7158617ef0fd4377b2a5b050fb72fc833ccdde6bd495c4728457669786b87c78ce10f94bcccd97748d4e2f9
-
SSDEEP
24576:B8qSi0R8g3097jprmXunEw+6c/E6CH0MGgJZ99Vb0X9LofIbx343siMZMMGp0xAH:LprEunEws/E6CH0MGWZHVbELVR4aWH0E
Malware Config
Extracted
cerberus
http://62.109.13.217/
Signatures
-
Cerberus family
-
pid Process 4793 com.neither.gym 4793 com.neither.gym -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json 4793 com.neither.gym [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json] 4793 com.neither.gym [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json] 4793 com.neither.gym -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.neither.gym Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.neither.gym Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.neither.gym -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.neither.gym -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neither.gym -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.neither.gym -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.neither.gym -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.neither.gym -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.neither.gym -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.neither.gym
Processes
-
com.neither.gym1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Checks CPU information
- Checks memory information
PID:4793
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59ee5d95e058633c875c141446592a722
SHA1bbb0486d9de29f5429a873d2e1627813c228447c
SHA256d134d7b805f67ed05f1caccdca35aaec06dbe1f424dab48a0e9b896fa37fc621
SHA512dc1b5ef057be6bcca4bcd43b6bc9fbc321c771e16b4f9ad30b199659a89dddc3245cddda6febd45b579059f57baceb5daa15475defcf0397e3cd812c9093a956
-
Filesize
64KB
MD5110202b5ce42b3969c51698b838b9ad7
SHA178ad6063fdd4d7be0b581e382911fb86ff814f43
SHA2563001b05c0b0a4437aaa53f25354cb33baead8318c3adb3f981627247cb02178f
SHA51265022ef0df30e85422d7a779965bdb5463cad78fe3ca2a0d233ffcdce7c3eb8d82af3cfcb834e76c68b8ff8ee43c6968936cc1e7a36d67bf98310720852b3f7d
-
Filesize
118KB
MD54c547b8533f6d0c8b84a52f8fbc4ad13
SHA1d8be8c20aca6d7a9348e221ad213555afcddb7e6
SHA25602d27d45c00f8af66aa0137dea77072fba44d0fe2aa6dd7d09106442df9e805d
SHA5126e1de7950ef6df1b0fe088d74b225fed8097abc917bf37ef9305fed5261b3908d3907ce37cd8a0dbb72f7d5e3f4dc231892853914b6077d659fee9d8d9a6f151
-
Filesize
150B
MD5cc274287935fcf869103e6715b8a8d8d
SHA14b6d362b1c26627cf2a3a6928d3e4141d50645b3
SHA2563da2702b107e69b1404073ba905593b40a2438ae8e3fb59ffb2bb6b41fd90ee0
SHA512a37a59fa003b4695644922379830f18dac2d27d0ed291278a412f1d5300371fdd0b57ca96542aa8d1b45e23d9a17bb7e1a38ab657a48eee7249358ceb2869031