Analysis
-
max time kernel
124s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
25-01-2025 22:09
Static task
static1
Behavioral task
behavioral1
Sample
e41e5cf98f70775be64bdfb72e7a864186f2d4bdfff999d78fb2e1a67a7f4a75.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
e41e5cf98f70775be64bdfb72e7a864186f2d4bdfff999d78fb2e1a67a7f4a75.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
e41e5cf98f70775be64bdfb72e7a864186f2d4bdfff999d78fb2e1a67a7f4a75.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
e41e5cf98f70775be64bdfb72e7a864186f2d4bdfff999d78fb2e1a67a7f4a75.apk
-
Size
1.5MB
-
MD5
c26d6f245ec5d70dafb7de798beeb2d8
-
SHA1
aa1fea0cfa2ec8a3aaf2890fdccee580787a6938
-
SHA256
e41e5cf98f70775be64bdfb72e7a864186f2d4bdfff999d78fb2e1a67a7f4a75
-
SHA512
218aa508af850846ae0fe5a35b8081f27430fbe3c457339767d002decbc8b0f1af5fc03f9aba8fca9542834c4b3100cbdf05fe1a776bdf4d0b521dc3b2d8f65c
-
SSDEEP
24576:BqEaaapgpFnLX7YIF93xg4MeJdA5fSaWs+DzipRG2YZlEqMrqjMMMENWrWfpP2Tf:gEaaaI3KkySaB+SDG2Y0trhrWfk3sLYV
Malware Config
Extracted
cerberus
http://188.120.225.180/
Signatures
-
Cerberus family
-
pid Process 4213 com.fall.double 4213 com.fall.double -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.fall.double/app_DynamicOptDex/sN.json 4237 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fall.double/app_DynamicOptDex/sN.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.fall.double/app_DynamicOptDex/oat/x86/sN.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.fall.double/app_DynamicOptDex/sN.json 4213 com.fall.double -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.fall.double Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.fall.double Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.fall.double -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fall.double android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fall.double android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fall.double android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fall.double android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fall.double android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fall.double android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fall.double android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fall.double -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.fall.double -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.fall.double -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.fall.double -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.fall.double -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.fall.double -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.fall.double -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.fall.double -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.fall.double
Processes
-
com.fall.double1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4213 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fall.double/app_DynamicOptDex/sN.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.fall.double/app_DynamicOptDex/oat/x86/sN.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4237
-
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233B
MD5def3f6e50e391856ce5239cd4c17ab58
SHA10fa3df15d8f3d861e54f3c01fff2b81200b2790d
SHA256e3244751d2ae289f0536377edb157c3ac2bf74a8314e342c8f096d424704f7e4
SHA51293d4d55eb0c19834abc0f4699b8d2526afb1f011781c12902ca87655a098ee235ebdfcf03bf3709223abab0a9571f805c4211c74db4540661777c0c288fd23e0
-
Filesize
64KB
MD52e6e3a46c452d711d93ae68b3fa88bc9
SHA1e65c1ba5a289f914cc330a1f56385c79ae864ebd
SHA2563655d51b2c2c832f5d5c2d0f2384edf5ef891a9b207f533fa5e67855116bf126
SHA512224c2267986ee966020ad31580b4c1ef4872d25cf28e26b12ae9bf85d8742105db532e7cd2e9807bd5961a8d9e05dc6a625f64e4e9b71c542dc92b29e69c3914
-
Filesize
64KB
MD5a5e6a67d9aec2c4eef17d0553dfa9374
SHA114d6af253342f5c5f9f1456f84fdfcd3c4a04cfb
SHA2563e302946b9c496c337b4b271c7254074557929e0446ba85bc91c86192bfeffcd
SHA5128a3979707656a0c416710a8ae5cebc9316b7cd3782039ed6471d896e3a9e53ee6cd8c6b7eafefa7ebb9e78708a07c835a8841aec463ffbf8e9ccfe6415b76cfa
-
Filesize
118KB
MD599700ea31627a7e6a880e347ffcc7380
SHA18497699a5570b57e790bdaa94a520c2e08bcc7a7
SHA25613718a6ee715c7df272860b16507e429c31a1d57f28049d6f30cfce00856b29b
SHA512f935ed9c81e362fc2e2c54853fd573aa2cba89456d125995b3c10e45f0c027319c0b2734649bbb5f522cf757a87babbb77c5c43f5e02b4aed7fdcfbb5e0e1892
-
Filesize
118KB
MD5db06c1ec59829a13509af9b81aa47881
SHA11fc471dd01410676aac988badab9e636b9948f2b
SHA25681ed5dbd3f672f61f1b04d96b413cc4a0406572427dc88356f6be5ba15f65cdc
SHA51245dec5a2124e30a63f672fd047a66b6d47537cebc964ec5f6939fe1c9636ff569151a0f03ae43b8b3f427bb3331ce309c4effa160249b852a538817e69fb6132