Analysis

  • max time kernel
    2374356s
  • max time network
    146s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    20-12-2023 06:30

General

  • Target

    8bebc8534bcd0e053862bd5fb4372184a839cde85f1b9aac18a887c64eeea68a.apk

  • Size

    2.4MB

  • MD5

    76cb07005d195f9acc37ce76ff6df8d1

  • SHA1

    747a3561268d733ac47cc8ed0e14b5095991ec46

  • SHA256

    8bebc8534bcd0e053862bd5fb4372184a839cde85f1b9aac18a887c64eeea68a

  • SHA512

    504f38e17f93abd2b46cdefc8a13b1e461708026ad47191eed7a8704e35b57fcd3eaa57d44440c450b8873ff04edbd6249aca4ff397c49f55d3d85706de4685a

  • SSDEEP

    49152:kHuj7mPKFflm0Dv7UzVqBGwipahwABJASBJ5w+zVAOWxYBn4aY3wRS:W8CPd+AInkaa6ASbHtWInf9S

Malware Config

Extracted

Family

alienbot

C2

http://ukalasey5.com

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus payload 1 IoCs
  • Makes use of the framework's Accessibility service 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Removes its main activity from the application launcher 3 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci
    1⤵
    • Makes use of the framework's Accessibility service
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    PID:5003

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json

    Filesize

    824KB

    MD5

    4bdf8369f0abef8af57c66519e0350e3

    SHA1

    7f5862be76cc5a05c02481201433ad4d27555169

    SHA256

    f2993ced77add5b01cc065f00e23a457938752fed478de8132835ddca38efe27

    SHA512

    079ad67755a819b22900169866a06537ab3e3a92ef62375e7c67d7d5ae94d1d41e983f0bd92bd149840c1232adaf2f9c155450137ae1822f22fc2f2978bcf754

  • /data/data/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json

    Filesize

    824KB

    MD5

    881bcd3c321e3ebd6a82e8579e64b399

    SHA1

    cdcb1778d33af2893cd58f5aabcbd7bf34ed685e

    SHA256

    7d3186fdf4e36e8578d9cf2c47c10550b379b42b18121e4e9419e9cb65b75791

    SHA512

    a1794b4335c41e6b4338fb32a82fc4ffd2c1b10f65972f1d901c35f8f65c7f6b3512ef512776b4558a4b357df385c331c9ae237a9c0776d56aeb64c81c39106c

  • /data/data/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/oat/ixcj.json.cur.prof

    Filesize

    386B

    MD5

    afd916be7d8a656981db80db5dab25d3

    SHA1

    20595f79d33dd0ae7cc49f5ab3ace0a0c383b4af

    SHA256

    469c1a96781636f817041de286a72035d5ed8c51e843413f5f83b81276359e16

    SHA512

    ea4f42f7510b9b9a2b9ff36074550e5d321168e53dd6d41d734c252723fe98818005bfd74856e12c944859f6567efd5796c9a17ec4e6397b64e63182922fa18f