Analysis
-
max time kernel
2374374s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
20-12-2023 06:30
Static task
static1
Behavioral task
behavioral1
Sample
8bebc8534bcd0e053862bd5fb4372184a839cde85f1b9aac18a887c64eeea68a.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8bebc8534bcd0e053862bd5fb4372184a839cde85f1b9aac18a887c64eeea68a.apk
Resource
android-x64-20231215-en
General
-
Target
8bebc8534bcd0e053862bd5fb4372184a839cde85f1b9aac18a887c64eeea68a.apk
-
Size
2.4MB
-
MD5
76cb07005d195f9acc37ce76ff6df8d1
-
SHA1
747a3561268d733ac47cc8ed0e14b5095991ec46
-
SHA256
8bebc8534bcd0e053862bd5fb4372184a839cde85f1b9aac18a887c64eeea68a
-
SHA512
504f38e17f93abd2b46cdefc8a13b1e461708026ad47191eed7a8704e35b57fcd3eaa57d44440c450b8873ff04edbd6249aca4ff397c49f55d3d85706de4685a
-
SSDEEP
49152:kHuj7mPKFflm0Dv7UzVqBGwipahwABJASBJ5w+zVAOWxYBn4aY3wRS:W8CPd+AInkaa6ASbHtWInf9S
Malware Config
Extracted
alienbot
http://ukalasey5.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbcidescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci -
Processes:
udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbcipid process 4603 udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci 4603 udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci 4603 udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbciioc pid process /data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json 4603 udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci /data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json 4603 udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbcidescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci
Processes
-
udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4603
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json
Filesize824KB
MD54bdf8369f0abef8af57c66519e0350e3
SHA17f5862be76cc5a05c02481201433ad4d27555169
SHA256f2993ced77add5b01cc065f00e23a457938752fed478de8132835ddca38efe27
SHA512079ad67755a819b22900169866a06537ab3e3a92ef62375e7c67d7d5ae94d1d41e983f0bd92bd149840c1232adaf2f9c155450137ae1822f22fc2f2978bcf754
-
/data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json
Filesize824KB
MD5881bcd3c321e3ebd6a82e8579e64b399
SHA1cdcb1778d33af2893cd58f5aabcbd7bf34ed685e
SHA2567d3186fdf4e36e8578d9cf2c47c10550b379b42b18121e4e9419e9cb65b75791
SHA512a1794b4335c41e6b4338fb32a82fc4ffd2c1b10f65972f1d901c35f8f65c7f6b3512ef512776b4558a4b357df385c331c9ae237a9c0776d56aeb64c81c39106c