Analysis
-
max time kernel
2252788s -
max time network
159s -
platform
android_x64 -
resource
android-x64-20230831-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230831-enlocale:en-usos:android-10-x64system -
submitted
11-09-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
b93caedc9c88a4b350e4a4dc2d6217c535a951360b3d03a8390fe2bb75f11097.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
b93caedc9c88a4b350e4a4dc2d6217c535a951360b3d03a8390fe2bb75f11097.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
b93caedc9c88a4b350e4a4dc2d6217c535a951360b3d03a8390fe2bb75f11097.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
HM_JsBridge.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
HM_JsBridge.js
Resource
win10v2004-20230831-en
Behavioral task
behavioral6
Sample
consentform.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
consentform.html
Resource
win10v2004-20230831-en
General
-
Target
b93caedc9c88a4b350e4a4dc2d6217c535a951360b3d03a8390fe2bb75f11097.apk
-
Size
2.1MB
-
MD5
81713d7dbd949c997dee822ecb162f92
-
SHA1
64a6becb5ae5e1ca8e11a1c3ec42d7788032b896
-
SHA256
b93caedc9c88a4b350e4a4dc2d6217c535a951360b3d03a8390fe2bb75f11097
-
SHA512
d085a7e01614416cee234bdde6b95aa75690320d23e381e90152ec8a30d2dfffb4c7aabe4ad648281cfa7843ddaf295ffbc3b689b51bcd03d9c874b9f4617d9e
-
SSDEEP
49152:GhSLR2JcrJDKcYHCHcsEETSm8t30J0801BpYXCkkaiYu2mcl1dIpkJwRJ5XH:oSlPrJDKcYCcs/TdCkkaqMmXH
Malware Config
Extracted
alienbot
http://limit-tanimlama.net
Extracted
alienbot
http://limit-tanimlama.net
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
resource yara_rule behavioral2/memory/5030-0.dex family_cerberus -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.shrimp.plate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.shrimp.plate -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.shrimp.plate -
pid Process 5030 com.shrimp.plate 5030 com.shrimp.plate 5030 com.shrimp.plate 5030 com.shrimp.plate 5030 com.shrimp.plate -
Acquires the wake lock. 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.shrimp.plate -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.shrimp.plate/app_DynamicOptDex/PWp.json 5030 com.shrimp.plate -
Reads information about phone network operator.
Processes
-
com.shrimp.plate1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Removes its main activity from the application launcher
- Acquires the wake lock.
- Loads dropped Dex/Jar
PID:5030 -
getprop ro.miui.ui.version.name2⤵PID:5151
-
-
getprop ro.miui.ui.version.name2⤵PID:5248
-
-
getprop ro.miui.ui.version.name2⤵PID:5397
-
-
getprop ro.miui.ui.version.name2⤵PID:5431
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD5aa284953a78db438b81418df5701554f
SHA1db5a9469ac112a43366f2b5664cb8b2831f2377e
SHA256d5687693b70d0ac09ef92c3c936518bdc9d134ebcf4fd9d15a65d3750df6079e
SHA51251674731679db84ecdb0b86416e4a98e517bc890838976dbb034b6e7266336429b7d326a4f53e4a49b46bd9b3e647bc47cd7a97264c47038ed09961ad08e17bb
-
Filesize
238KB
MD548f82a2b8ab94a24e5c8dc36bb0265c7
SHA16486d693ec759c07631b414be4c62e2caa5e9e92
SHA256d6adeedd0bba6f02d979469d88f457e672b28ab6ea91bac1195a046e5999a4bf
SHA512165fc1f815ff603f115123332b3a210627a986e24a99f94523b85ac6bf995287739cff9c7f00987d9b955bd1665656e25834ee7823ae4ba589fecee787687a31
-
Filesize
535B
MD5282a9707961224006e21e1e8414b6d50
SHA17a898a2912c8f62db9a909f45a0836916d5a613d
SHA25655fe5fd855cbf2608b60a7765e36426398b93af592169185f1c43c65d90584a3
SHA51267a3504f0bff9eb1666fb284256e7e565db6ac13b51f9d62dd3ec066266f0ccc3bd7ea4bbcf1d1b6bad57e67ed0e0074fca001c35594477a65f824a741ce6d89
-
Filesize
946KB
MD5a73f108dc1b655252c7e45e5df04d4f6
SHA18459f380f7ef684e393c4408f7f4ee58c99147c4
SHA256c34367f5395f513b8ee0dedcd5502aed69172e71004a80c1f896ca97e05f4f62
SHA5128f84e47b367fb35a073a31cf41422edccbde99ee126cb37d2df0bddae5e8ca0f5df4d6221930548bfd216f583b2885485d764fd58f73d6a14b9a697b66c58dc4
-
Filesize
483KB
MD55d1270ce04e50f766ffec46f60f7db9b
SHA1b00a717497db20d791d954de2e49cc883afbd3fb
SHA2567dd5ca5efcccb89e7fc6507d82bef770378f3b013a4897fdcb6b64688572a6d2
SHA512acc2ae388765bfb72fff09ba28a9d12107512b2d04ad5df8472a23658252c08ba1a4b409018b4dd8b373360cfcc92b18f393c844e19b70b571d64b26f533c3cf