Analysis

  • max time kernel
    54s
  • max time network
    150s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    18-01-2025 22:11

General

  • Target

    7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9.apk

  • Size

    1.5MB

  • MD5

    a78bf373c2c15968e62ebb3318983d36

  • SHA1

    c5ba84594c2880c42826d56fcad4a01cd4ba958c

  • SHA256

    7c695c6392725a37a2c3de19211e1c3bc03c87715897d044adbe00360e2a62e9

  • SHA512

    7f5aab2a4ae23c1034790aa1d54a2addaa5491a7a7158617ef0fd4377b2a5b050fb72fc833ccdde6bd495c4728457669786b87c78ce10f94bcccd97748d4e2f9

  • SSDEEP

    24576:B8qSi0R8g3097jprmXunEw+6c/E6CH0MGgJZ99Vb0X9LofIbx343siMZMMGp0xAH:LprEunEws/E6CH0MGWZHVbELVR4aWH0E

Malware Config

Extracted

Family

cerberus

C2

http://62.109.13.217/

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus family
  • Removes its main activity from the application launcher 1 TTPs 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Requests changing the default SMS application. 2 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.neither.gym
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Performs UI accessibility actions on behalf of the user
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Listens for changes in the sensor environment (might be used to detect emulation)
    • Checks CPU information
    • Checks memory information
    PID:4793

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json

    Filesize

    64KB

    MD5

    9ee5d95e058633c875c141446592a722

    SHA1

    bbb0486d9de29f5429a873d2e1627813c228447c

    SHA256

    d134d7b805f67ed05f1caccdca35aaec06dbe1f424dab48a0e9b896fa37fc621

    SHA512

    dc1b5ef057be6bcca4bcd43b6bc9fbc321c771e16b4f9ad30b199659a89dddc3245cddda6febd45b579059f57baceb5daa15475defcf0397e3cd812c9093a956

  • /data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json

    Filesize

    64KB

    MD5

    110202b5ce42b3969c51698b838b9ad7

    SHA1

    78ad6063fdd4d7be0b581e382911fb86ff814f43

    SHA256

    3001b05c0b0a4437aaa53f25354cb33baead8318c3adb3f981627247cb02178f

    SHA512

    65022ef0df30e85422d7a779965bdb5463cad78fe3ca2a0d233ffcdce7c3eb8d82af3cfcb834e76c68b8ff8ee43c6968936cc1e7a36d67bf98310720852b3f7d

  • /data/user/0/com.neither.gym/app_DynamicOptDex/LFYTpH.json

    Filesize

    118KB

    MD5

    4c547b8533f6d0c8b84a52f8fbc4ad13

    SHA1

    d8be8c20aca6d7a9348e221ad213555afcddb7e6

    SHA256

    02d27d45c00f8af66aa0137dea77072fba44d0fe2aa6dd7d09106442df9e805d

    SHA512

    6e1de7950ef6df1b0fe088d74b225fed8097abc917bf37ef9305fed5261b3908d3907ce37cd8a0dbb72f7d5e3f4dc231892853914b6077d659fee9d8d9a6f151

  • /data/user/0/com.neither.gym/app_DynamicOptDex/oat/LFYTpH.json.cur.prof

    Filesize

    150B

    MD5

    cc274287935fcf869103e6715b8a8d8d

    SHA1

    4b6d362b1c26627cf2a3a6928d3e4141d50645b3

    SHA256

    3da2702b107e69b1404073ba905593b40a2438ae8e3fb59ffb2bb6b41fd90ee0

    SHA512

    a37a59fa003b4695644922379830f18dac2d27d0ed291278a412f1d5300371fdd0b57ca96542aa8d1b45e23d9a17bb7e1a38ab657a48eee7249358ceb2869031