Analysis
-
max time kernel
4153666s -
max time network
135s -
platform
android_x64 -
resource
android-x64-20230831-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230831-enlocale:en-usos:android-10-x64system -
submitted
03-10-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
1f86e1061f612b9c691923c71d6eb0bdfb200b527e276265cffcead53bd72df1.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
1f86e1061f612b9c691923c71d6eb0bdfb200b527e276265cffcead53bd72df1.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
1f86e1061f612b9c691923c71d6eb0bdfb200b527e276265cffcead53bd72df1.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
HM_JsBridge.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
HM_JsBridge.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
consentform.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
consentform.html
Resource
win10v2004-20230915-en
General
-
Target
1f86e1061f612b9c691923c71d6eb0bdfb200b527e276265cffcead53bd72df1.apk
-
Size
2.2MB
-
MD5
1c19d02119a2eebc73f6dd06bda8eb3a
-
SHA1
5102892b2b426e5a871bf17dad147831702b290f
-
SHA256
1f86e1061f612b9c691923c71d6eb0bdfb200b527e276265cffcead53bd72df1
-
SHA512
2159d45132a3ba88e44a720365201844ec79aa9e7be51f8bb15786a613398551e5bd489e0f03749129bac1a6a477dbdd90fc7fa6945ab9e8aa4e8c516c09bfbe
-
SSDEEP
49152:cn9na/6Yj+Oayza7a/BM58PKFVI0J0801HBqfEYnocl1dIpkJORF5zDuxP:MJa/64+bWS1TvREYWMQzD4
Malware Config
Extracted
alienbot
http://eklimit.online
Extracted
alienbot
http://eklimit.online
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.price.modify/app_DynamicOptDex/ucTeNGk.json family_cerberus -
Makes use of the framework's Accessibility service. 2 IoCs
Processes:
com.price.modifydescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.price.modify Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.price.modify -
Processes:
com.price.modifypid process 5004 com.price.modify 5004 com.price.modify 5004 com.price.modify 5004 com.price.modify 5004 com.price.modify 5004 com.price.modify 5004 com.price.modify 5004 com.price.modify -
Acquires the wake lock. 1 IoCs
Processes:
com.price.modifydescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.price.modify -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.price.modifyioc pid process /data/user/0/com.price.modify/app_DynamicOptDex/ucTeNGk.json 5004 com.price.modify
Processes
-
com.price.modify1⤵
- Makes use of the framework's Accessibility service.
- Removes its main activity from the application launcher
- Acquires the wake lock.
- Loads dropped Dex/Jar
PID:5004 -
getprop ro.miui.ui.version.name2⤵PID:5158
-
-
getprop ro.miui.ui.version.name2⤵PID:5234
-
-
getprop ro.miui.ui.version.name2⤵PID:5370
-
-
getprop ro.miui.ui.version.name2⤵PID:5402
-
-
getprop ro.miui.ui.version.name2⤵PID:5440
-
-
getprop ro.miui.ui.version.name2⤵PID:5470
-
-
getprop ro.miui.ui.version.name2⤵PID:5507
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393B
MD5addc8d6a3749df3c3fa75b0076893552
SHA15ebad253a3cb4e820a40df8acf33c7eecc7d1ccd
SHA256082f698fe96ed9650e09fac78e69f28e1be117432bc34813b75f7b579ca3f683
SHA5123ba945a20586d99a1fefab1285be9f5cbecf46fd0eee078edfcc728cdaaba6c577de8940a4041333962b2527ae57fdd7b41ac1318c6cc09bee698ea05d2ba837
-
Filesize
238KB
MD5a75699a4438a593e7c7e791fefc7e833
SHA1ed4bd9ed9ee4778174791978282d0277403b7e3a
SHA2567af6e01b3bd729faad1b1054ec96513848332cb1ead20efc786e95b63f45c534
SHA512e07a35275adedde4078a9050a0aa584e0e877cf998e48050277e0f2711a5c05073b48dd0e460bf9acc2012db62b82d95914bcb451694b35e30c7b3cf341cf8fe
-
Filesize
238KB
MD5e0fff57264a304c5561200b98c04aa32
SHA1abe3e4d0b626d4d7397b88432b7c69ab0c71d95f
SHA256d1fb4489b27d8b947418743db74ee7755412c36d38a1ce64883d540463508b05
SHA51239ec0a1dc183ef90f35f583f13e1acf4d4ac238d072e9e4e055efa32e7db331d4fbef524663aee688b824611438ab4c94c0efb9f7ca5861a9e50d506157d0e5e
-
Filesize
483KB
MD5b62433d8f6929582425b73af4a70c22c
SHA1e550a51324db7c0a1ff09ed03d75ed180188a05c
SHA256188b8f0aefc0e07eb49cde1cca3a7a46689cb68740fab34d8d1bfd78330c676a
SHA5129c0336c0ba9e2b49a3a57fc0b72d95b91afe42dee7ab5146d1e4b6412174963453aa29dfb37ea54ef48c0f041eef76879cb60e2cea6e0624450f4fff6846d1a7