Overview
overview
10Static
static
765f88e03c9...cb.apk
android-9-x86
1065f88e03c9...cb.apk
android-10-x64
1065f88e03c9...cb.apk
android-11-x64
10CheatSheet...s.html
windows7-x64
1CheatSheet...s.html
windows10-2004-x64
1CheatSheet...n.html
windows7-x64
1CheatSheet...n.html
windows10-2004-x64
1CheatSheet...s.html
windows7-x64
1CheatSheet...s.html
windows10-2004-x64
1chartjs-pl...min.js
windows7-x64
1chartjs-pl...min.js
windows10-2004-x64
1hammerjs.js
windows7-x64
1hammerjs.js
windows10-2004-x64
1jquery-3.4.1.min.js
windows7-x64
1jquery-3.4.1.min.js
windows10-2004-x64
1template.js
windows7-x64
1template.js
windows10-2004-x64
1Analysis
-
max time kernel
2796164s -
max time network
166s -
platform
android_x64 -
resource
android-x64-20231023.1-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231023.1-enlocale:en-usos:android-10-x64system -
submitted
06-11-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
65f88e03c976323560c6ce136aeccacf227e46fca1a9e81296eea049d8fa2bcb.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
65f88e03c976323560c6ce136aeccacf227e46fca1a9e81296eea049d8fa2bcb.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
65f88e03c976323560c6ce136aeccacf227e46fca1a9e81296eea049d8fa2bcb.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
CheatSheet-Algebra_zs.html
Resource
win7-20231020-en
Behavioral task
behavioral5
Sample
CheatSheet-Algebra_zs.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral6
Sample
CheatSheet-Derivatives_en.html
Resource
win7-20231025-en
Behavioral task
behavioral7
Sample
CheatSheet-Derivatives_en.html
Resource
win10v2004-20231023-en
Behavioral task
behavioral8
Sample
CheatSheet-Derivatives_zs.html
Resource
win7-20231023-en
Behavioral task
behavioral9
Sample
CheatSheet-Derivatives_zs.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
chartjs-plugin-zoom.min.js
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
chartjs-plugin-zoom.min.js
Resource
win10v2004-20231025-en
Behavioral task
behavioral12
Sample
hammerjs.js
Resource
win7-20231020-en
Behavioral task
behavioral13
Sample
hammerjs.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral14
Sample
jquery-3.4.1.min.js
Resource
win7-20231020-en
Behavioral task
behavioral15
Sample
jquery-3.4.1.min.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
template.js
Resource
win7-20231023-en
Behavioral task
behavioral17
Sample
template.js
Resource
win10v2004-20231023-en
General
-
Target
65f88e03c976323560c6ce136aeccacf227e46fca1a9e81296eea049d8fa2bcb.apk
-
Size
1.6MB
-
MD5
7d7025c8675ffe3963f6b4c1674cbe5b
-
SHA1
ff402a12e36d840a93bbb16fbb4e5a09095e3390
-
SHA256
65f88e03c976323560c6ce136aeccacf227e46fca1a9e81296eea049d8fa2bcb
-
SHA512
73e0d06af6ea46bbda4b01caefaab8c25d3e85d900367278be28378874f4ddbbd3c44226ef0d5d19e608bbd3202458549abad1f964d9a4c8bfed91e09f67b459
-
SSDEEP
49152:4Sfv9A9pkeMNAQQKOK5uF2KWhLYemlwMEJxGW55P2pLFS5:Rf1A7keMNA1K5KkmemlgxGW5opLFe
Malware Config
Extracted
alienbot
http://37.148.210.173
Extracted
alienbot
http://37.148.210.173
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.clip.shoulder/app_DynamicOptDex/xDrdtlu.json family_cerberus -
Makes use of the framework's Accessibility service. 2 IoCs
Processes:
com.clip.shoulderdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.clip.shoulder Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.clip.shoulder -
Processes:
com.clip.shoulderpid process 5155 com.clip.shoulder 5155 com.clip.shoulder -
Acquires the wake lock. 1 IoCs
Processes:
com.clip.shoulderdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.clip.shoulder -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.clip.shoulderioc pid process /data/user/0/com.clip.shoulder/app_DynamicOptDex/xDrdtlu.json 5155 com.clip.shoulder
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD5966afdf8cdddbd6de72f0b2d30cde02e
SHA18c91f17f7cfe18fe684d7382cd098a2faf0b3fe8
SHA2566d8f35ca3d2875b7255dbef0d04df7697e884fbb2a5ca0fceef75a00c0375cbf
SHA512fc977a80e296af9e600ce511b0b4758b68072d52b7c40210249b26d97737c774d310a6d449f45555475c01e937d8def3485be5bbc325856cb0475ed9130832cb
-
Filesize
238KB
MD5033372e71cfe37afa161932ca1514575
SHA16ab3eb0a97fefa13be0a0ae2c40d87072e3e28a2
SHA256080a2ace0567038838d754063aea5a7dc60bae013698e9152683247917842841
SHA512c556ab68d506ec2bf107f2f1b65d22634c12d2ebb54652db8941d511d864936c316a41437d47db13be2648e131151f9fbaef44c313ae006108e33c9175d42374
-
Filesize
483KB
MD5fef861697d6e865ffd0ac495bba92bc3
SHA1796094bd56f01b637c0165d8d734dc00a9481e4b
SHA2569f81917c797bec5a26abf4ed12dd81f7b22837883182dea970398332af763f42
SHA512fef90c111d11b58dc3a3ef8e50ba362a5d0307adc7d22b83dedbcab765b0926bbf074d7fe6d2a0f36177578432deee6c030b1696492b33b3d5685535d18fa7a8