Analysis
-
max time kernel
41s -
max time network
157s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
02/02/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
9ea364ea16c656f5f6b33caf7ff66f7eb85986afd1d5a34d62c502c9a92e1bba.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
9ea364ea16c656f5f6b33caf7ff66f7eb85986afd1d5a34d62c502c9a92e1bba.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
9ea364ea16c656f5f6b33caf7ff66f7eb85986afd1d5a34d62c502c9a92e1bba.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
9ea364ea16c656f5f6b33caf7ff66f7eb85986afd1d5a34d62c502c9a92e1bba.apk
-
Size
1.6MB
-
MD5
f89ac4860d2ffe3042c9616a1a7af5ec
-
SHA1
e656fba5b05f9cd6f6729c0bbec319054a145e4d
-
SHA256
9ea364ea16c656f5f6b33caf7ff66f7eb85986afd1d5a34d62c502c9a92e1bba
-
SHA512
c5098d3d561f8743f2f8af76244eddb824497920532c12a70b05102c9e91d66222110d4b95d8c6753ca3ab1b31ad43931fd117c516f8b987e5c396c13e4d51ba
-
SSDEEP
49152:mhODCycMLSKdEia8jXHKUPoWjWVkE1+nLb2m:mhEwMLSKdEiNGU41u/2m
Malware Config
Extracted
cerberus
http://188.120.228.245/
Signatures
-
Cerberus family
-
pid Process 4341 com.thumb.steak 4341 com.thumb.steak -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.thumb.steak/app_DynamicOptDex/sA.json 4367 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.thumb.steak/app_DynamicOptDex/sA.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.thumb.steak/app_DynamicOptDex/oat/x86/sA.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.thumb.steak/app_DynamicOptDex/sA.json 4341 com.thumb.steak -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.thumb.steak Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.thumb.steak Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.thumb.steak -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.thumb.steak android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.thumb.steak android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.thumb.steak android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.thumb.steak -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.thumb.steak -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.thumb.steak -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.thumb.steak -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.thumb.steak -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.thumb.steak -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.thumb.steak -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.thumb.steak -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.thumb.steak
Processes
-
com.thumb.steak1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Tries to add a device administrator.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4341 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.thumb.steak/app_DynamicOptDex/sA.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.thumb.steak/app_DynamicOptDex/oat/x86/sA.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4367
-
Network
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5bdcab3408ec3d18d77c8e8e644c18d81
SHA1d15a339ce65663c5dc60ce1c25a05251dc55e309
SHA256b1fd94a393f7bac600af51008393d4b5e69c6aab96b68b469b87e0204fe06a64
SHA5121565e0735102ed57745c5d9a1851dbc3c5c34940f77a6ed31f7ebf1e65aa967fc86a248231bb55e11f7d8d33e9106541eece155c5be8713f18271c5ac984e740
-
Filesize
64KB
MD57b6d139d72e113b947deb8d6cc7ca65b
SHA101683e2e1ef5bde6dc2a2a1dc737934c7e4d4807
SHA256765fba2b72e2ae6d993c4fcc2104ed6ddb38ef9aa9c940fd29ee09a6affdd9ff
SHA512876c9917437e35ad9117f0359cb083c1f589ee45cbe42000cd05c5ae9f63535a29134a9c1fc8ff474cd6f25ca9f1cbd7c54f5ec8bb713584e07ae6f63f08e10a
-
Filesize
118KB
MD5c5ce525295a731f5603be67c2c145d83
SHA1404b753930aab8dbda9bdb3f223a35b35e3af484
SHA256631718d8722a79d404acea74667da0f3b6c7a06836287fb6bd4ba41d2ac92afb
SHA512d182b102c4e0e8237895af3e49bdc113bba0531b8d6ea4f28cfed0e74ca2dcdbf73d1c649868770932cb1a1f6c4d544ae879f08ce9ddd12a38e3eecfc4196b9d
-
Filesize
118KB
MD526fa0f83291d4580e90abd9afbe8801f
SHA1909d65523a0ec26f954c90ad99ad32317283b7be
SHA25608a2c2ddeea69bad4702f1ba127c8846ff989cb51b5fc21ee0e71b7df826f64a
SHA5121e0bd965bac4933b5fc85982a4533e8e8ce595469aaef6639d5d63d25bf2e65d367a24023d724f625be2fdc3e9d49107b01ca8fe57791572f24fc3237412164d