Overview
overview
10Static
static
7d494040139...78.apk
android-9-x86
10d494040139...78.apk
android-10-x64
10d494040139...78.apk
android-11-x64
10medialib.js
windows7-x64
1medialib.js
windows10-2004-x64
1mintegral_...t.html
windows7-x64
1mintegral_...t.html
windows10-2004-x64
1parse_movie.html
windows7-x64
1parse_movie.html
windows10-2004-x64
1parse_online.html
windows7-x64
1parse_online.html
windows10-2004-x64
1parse_search.html
windows7-x64
1parse_search.html
windows10-2004-x64
1watch_loading.html
windows7-x64
1watch_loading.html
windows10-2004-x64
1ytaplayer.html
windows7-x64
1ytaplayer.html
windows10-2004-x64
1ytaplayer.js
windows7-x64
1ytaplayer.js
windows10-2004-x64
1ytaplayer_...sis.js
windows7-x64
1ytaplayer_...sis.js
windows10-2004-x64
1Analysis
-
max time kernel
3056216s -
max time network
168s -
platform
android_x64 -
resource
android-x64-arm64-20231023-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231023-enlocale:en-usos:android-11-x64system -
submitted
09-11-2023 22:05
Static task
static1
Behavioral task
behavioral1
Sample
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
medialib.js
Resource
win7-20231020-en
Behavioral task
behavioral5
Sample
medialib.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
mintegral_jscommon_authtext.html
Resource
win7-20231020-en
Behavioral task
behavioral7
Sample
mintegral_jscommon_authtext.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
parse_movie.html
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
parse_movie.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
parse_online.html
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
parse_online.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral12
Sample
parse_search.html
Resource
win7-20231023-en
Behavioral task
behavioral13
Sample
parse_search.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral14
Sample
watch_loading.html
Resource
win7-20231023-en
Behavioral task
behavioral15
Sample
watch_loading.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral16
Sample
ytaplayer.html
Resource
win7-20231023-en
Behavioral task
behavioral17
Sample
ytaplayer.html
Resource
win10v2004-20231025-en
Behavioral task
behavioral18
Sample
ytaplayer.js
Resource
win7-20231020-en
Behavioral task
behavioral19
Sample
ytaplayer.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral20
Sample
ytaplayer_diagnosis.js
Resource
win7-20231023-en
Behavioral task
behavioral21
Sample
ytaplayer_diagnosis.js
Resource
win10v2004-20231023-en
General
-
Target
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078.apk
-
Size
2.4MB
-
MD5
97b271ea24a9a983d381bf6f43df4e77
-
SHA1
04ea7bb813711a257949e64621f6110c2a0f3ba1
-
SHA256
d4940401398aaeac4b523dca648577b1f39646f5942a19d62275df539afaa078
-
SHA512
cd0c32a7c1f80723d224f7ee17fbff0c8d8903616795a047bc425a9e09cc6c6504d37b2ec303ed791a98ed2c559097ebfec7646b81d062af3a1a524e00e24987
-
SSDEEP
49152:rq0nLgpDpZ4lXrfXVCw5KvGEgXqV/W68dqPHONkhLCivXr/+d4+daP9KDQNrqMgE:bLgQXLXjoXexOlLCivXr26Om8Q1BgE
Malware Config
Extracted
alienbot
http://androidplayprotect.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 3 IoCs
resource yara_rule behavioral3/files/fstream-2.dat family_cerberus behavioral3/memory/4339-0.dex family_cerberus behavioral3/memory/4339-1.dex family_cerberus -
Makes use of the framework's Accessibility service. 2 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb -
pid Process 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb/app_DynamicOptDex/rlbxJMZ.json 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb /data/user/0/zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb/app_DynamicOptDex/rlbxJMZ.json 4339 zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb
Processes
-
zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb1⤵
- Makes use of the framework's Accessibility service.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4339 -
getprop ro.miui.ui.version.name2⤵PID:4436
-
-
getprop ro.miui.ui.version.name2⤵PID:4558
-
-
getprop ro.miui.ui.version.name2⤵PID:4683
-
-
getprop ro.miui.ui.version.name2⤵PID:4715
-
-
getprop ro.miui.ui.version.name2⤵PID:4758
-
-
getprop ro.miui.ui.version.name2⤵PID:4795
-
-
getprop ro.miui.ui.version.name2⤵PID:4821
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/zjfklmwhkzlm.ejrpibkfullinntk.osjpmnjjbkzdheqjueb/app_DynamicOptDex/oat/rlbxJMZ.json.cur.prof
Filesize333B
MD5d5ed041f69b8acd0701e23356e73d150
SHA1a399bb9927188d304390f3479ed0a71a90f967a5
SHA2565de8bac5726d95a1f744a8d66ea0c6e6f66a2874e21ed0cf7d3a63f185751d4d
SHA51219508f910a692a78649d1c088c77fabc1cc91af49eaf16cba57d76323883e0f072451d88409028ca3fada307beff73e7831e6eafa6a7697e46eeaf6e8f56e818
-
Filesize
673KB
MD594ed43749f0815cd8769018d6e46d52b
SHA195d9b6e732ca90727e53ad19d4b99f7bdd1f4492
SHA2563c552dd49bf935458d7ac3e572d8f037b25b02b0c06ff4722a42c240fd87dd7c
SHA512bce3f79133f5829156088e25be5f8a337b7beb3ca33d118aa6a7c59bbbb2f100de5e73359924475189a376976f842ac2f93ca2415c7e356b1a470af58eebff73
-
Filesize
673KB
MD5aad1c304c9388c9be1982ea100161c30
SHA1546dbe1713151ec62ee42d27701bc8d1417c425c
SHA2562ab80dd9f16a135754a6fb4916d3485ebc26b174efad9b8719ad106d48b58b79
SHA5127e4ade85719b58bfe0daaf2a1cf4629a65fc1414149b39cbd7cfa9c37835f7fa2bd236b4af24ac7db7a77d9260b40af08dc55e7c16ffd13dae6a4edb3f294d3e
-
Filesize
673KB
MD5aad1c304c9388c9be1982ea100161c30
SHA1546dbe1713151ec62ee42d27701bc8d1417c425c
SHA2562ab80dd9f16a135754a6fb4916d3485ebc26b174efad9b8719ad106d48b58b79
SHA5127e4ade85719b58bfe0daaf2a1cf4629a65fc1414149b39cbd7cfa9c37835f7fa2bd236b4af24ac7db7a77d9260b40af08dc55e7c16ffd13dae6a4edb3f294d3e
-
Filesize
673KB
MD5aad1c304c9388c9be1982ea100161c30
SHA1546dbe1713151ec62ee42d27701bc8d1417c425c
SHA2562ab80dd9f16a135754a6fb4916d3485ebc26b174efad9b8719ad106d48b58b79
SHA5127e4ade85719b58bfe0daaf2a1cf4629a65fc1414149b39cbd7cfa9c37835f7fa2bd236b4af24ac7db7a77d9260b40af08dc55e7c16ffd13dae6a4edb3f294d3e