Android Analysis Report Android_Guncelleme.apk
Overview
General Information
Detection
Cerberus
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Detected Cerberus Banking Trojan
Access the class loader (often done to load a new code)
Accesses FileOutputStream via Reflection
Removes its application launcher (likely to stay hidden)
Tries to disable the administrator user
Drops a new dex file
Requests to ignore battery optimizations
Drops a new APK file
Queries list of running processes/tasks
Uses the DexClassLoader (often used for code injection)
Starts an activity on phone boot (autostart)
Starts/registers a service/receiver on phone boot (autostart)
Obfuscates method names
Has permission to read the SMS storage
Found suspicious command strings (may be related to BOT commands)
Monitors incoming SMS
Checks an internet connection is available
Creates SMS data (e.g. PDU)
Requests potentially dangerous permissions
Has permission to perform phone calls in the background
Queries the phones location (GPS)
Opens an internet connection
Queries the network operator name
May access the Android keyguard (lock screen)
Has permission to receive SMS in the background
Lists and deletes files in the same context
Has permission to read contacts
Uses DownloadManager to fetch additional components
Queries the network operator ISO country code
Detected TCP or UDP traffic on non-standard ports
Has functionalty to add an overlay to other apps
Queries the unqiue device ID (IMEI, MEID or ESN)
Has permission to read the phones state (phone number, device IDs, active call ect.)
Accesses android OS build fields
Executes native commands
Queries MMS data
Checks if the device administrator is active
Performs DNS lookups (Java API)
Queries several sensitive phone informations
Has permission to send SMS in the background
Has permission to execute code after phone reboot
Uses reflection
Classification
Yara Overview |
---|
No yara matches |
---|
Jbx Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link |
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: |
Source: | API Call: |
Source: | HTTPS traffic detected: |
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: |
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: |
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: |
Source: | TCP traffic: |
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | HTTPS traffic detected: |
E-Banking Fraud: |
---|
Detected Cerberus Banking Trojan | Show sources |
Source: | Method string: |
Source: | API Call: |
Spam, unwanted Advertisements and Ransom Demands: |
---|
Tries to disable the administrator user | Show sources |
Source: | API Call: | ||
Source: | API Call: |
Source: | Request permission: |
Source: | Request permission: |
Source: | API Calls in same method context: | ||
Source: | API Calls in same method context: | ||
Source: | API Calls in same method context: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | API Call: |
System Summary: |
---|
Requests to ignore battery optimizations | Show sources |
Source: | Method string: |
Source: | Request permission: | ||
Source: | Request permission: | ||
Source: | Request permission: | ||
Source: | Request permission: | ||
Source: | Request permission: | ||
Source: | Request permission: | ||
Source: | Request permission: | ||
Source: | Request permission: |
Source: | API Call: |
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: |
Source: | API Call: |
Source: | Classification label: |
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: |
Data Obfuscation: |
---|
Accesses FileOutputStream via Reflection | Show sources |
Source: | API Call: |
Source: | Total valid method names: |
Persistence and Installation Behavior: |
---|
Drops a new dex file | Show sources |
Source: | File dump: | Jump to dropped file |
Drops a new APK file | Show sources |
Source: | File dump: | Jump to dropped file |
Source: | API Call: |
Source: | API Call: | ||
Source: | API Call: |
Source: | Request permission: |
Hooking and other Techniques for Hiding and Protection: |
---|
Removes its application launcher (likely to stay hidden) | Show sources |
Source: | API Call: |
Source: | API Call: |
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: | ||
Source: | API Call: |
Source: | Field Access: | ||
Source: | Field Access: | ||
Source: | Field Access: | ||
Source: | Field Access: | ||
Source: | Field Access: | ||
Source: | Field Access: | ||
Source: | Field Access: | ||
Source: | Field Access: | ||
Source: | Field Access: |
Source: | Method string: | ||
Source: | Method string: | ||
Source: | Method string: | ||
Source: | Method string: | ||
Source: | Method string: | ||
Source: | Method string: | ||
Source: | Method string: | ||
Source: | Method string: |
Source: | Binary or memory string: |
Anti Debugging: |
---|
Access the class loader (often done to load a new code) | Show sources |
Source: | API Call: | ||
Source: | Method string: | ||
Source: | Method string: |
Source: | API Call: | ||
Source: | API Call: |
Source: | API Call: |
Source: | API Call: | ||
Source: | API Call: |
Source: | API Call: |
Source: | Request permission: |
Source: | Registered receiver: |
Source: | API Call: |
Source: | Request permission: |
Source: | Request permission: |
Source: | Request permission: |
Source: | API Call: |
Source: | Method string: | ||
Source: | Instruction: | ||
Source: | Instruction: | ||
Source: | Instruction: |
Source: | API Call: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Obfuscated Files or Information1 | Capture SMS Messages1 | System Network Connections Discovery1 | Remote Services | Location Tracking1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Exploit SS7 to Redirect Phone Calls/SMS2 | Remotely Track Device Without Authorization | Delete Device Data1 |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Evade Analysis Environment1 | LSASS Memory | Location Tracking1 | Remote Desktop Protocol | Network Information Discovery1 | Exfiltration Over Bluetooth | Non-Standard Port1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Carrier Billing Fraud1 |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | Security Software Discovery1 | SMB/Windows Admin Shares | Capture SMS Messages1 | Automated Exfiltration | Application Layer Protocol1 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | System Information Discovery12 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Evade Analysis Environment1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | Process Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features |
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.