Static and Dynamic Analysis of “Evdeyim” App.
Introduction:
With the great help from the Malware Hunter Team and Arkbird_SOLG we got the latest samples of Cerberus. Hopefully, tried to reverse it.


Analysis of “Evdeyim” App

Static Analysis:-
Hash’s:

Information about app :


Certificate Info:

App Permissions:

Obfuscation and Anti-VM Code:

Code Analysis:
App logs into the sensitive information of user which should never be logged. It also has ability to read and write into the external storage and also uses the insecure RNG [Random Number Generator ] but has a secure SSL. Moreover , it has weak hash’s and also stores the sensitive information of user in temp file. Many of the services run by App are insecure.
URLs:

Activities Run by App:



Services run by App:

Receivers:

Dynamic Analysis:-
Running app dynamically on emulator. It runs for sometime but it crashes as further dynamic analysis is done on app.


Base64 Decoding:
Around 7000 base64 strings are being decoded from App. Some of them are:






Activity:

Binder:




URLs:

Emails:

Logs:<a href="https://medium.com/media/78d454a75d6ab81bfbc02e32173aaadb/href">https://medium.com/media/78d454a75d6ab81bfbc02e32173aaadb/href</a>
C2 Server:
64[.]233[.]165[.]95

Communicating Files with C2 Server:


Conclusion:
C2 server is hosting many apps that are being the samples of Cerberus Malware.
That’s all for today.
Article Link: https://medium.com/@0xthreatintel/cerberus-malware-internals-ce19585e6620?source=rss-a15183055fd6------2