Analysis
-
max time kernel
2426387s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
20-12-2023 07:21
Static task
static1
Behavioral task
behavioral1
Sample
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601.apk
Resource
android-x64-20231215-en
General
-
Target
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601.apk
-
Size
1.8MB
-
MD5
88982178e9df34bfcfd0b03d73c8c713
-
SHA1
f33bcc2881f2fa274d2205dc23648449ceb23f61
-
SHA256
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601
-
SHA512
3b85142303d1607e718b4658eed2ede5a3695af5a193d7a3f7c529df39d45fb9cd873989de171139296ef52ad0aeecc0507681790a858c77aa6cf77cb20cf910
-
SSDEEP
49152:fml2hgZfDc2MsSeqW3u2Y0Cr6s1Bm2SOvxoewADrU1PE9sS:e2sKsDuQCrJLmnOYAvCPQsS
Malware Config
Extracted
alienbot
http://18likveletcalistiranusom.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
resource yara_rule behavioral3/files/fstream-2.dat family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt -
pid Process 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt/app_DynamicOptDex/YieIMdU.json 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt /data/user/0/gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt/app_DynamicOptDex/YieIMdU.json 4618 gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt
Processes
-
gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4618
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt/app_DynamicOptDex/YieIMdU.json
Filesize710KB
MD54cfac28e6de420a67f47c16112a14ba5
SHA1e92a353a9fc6764189fbf35b0eb011b8412aefe3
SHA2569c31d977b4333bfe7727d1f44a2386685ea58dc7dc9e1eba6abd1d14c9404b2d
SHA512c05cc9678e00952b47add83e4bcc5012e4542b9b4f99acfa3410ac1ce5b0216946965e4c00f7d59694165ff50f6c153356c23261a8a966f0bddf2c74d2d8debb
-
/data/user/0/gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt/app_DynamicOptDex/YieIMdU.json
Filesize710KB
MD51a2c6b59c2e35039736f07c45175793e
SHA1106b97e48d61bb952d4b154bd91a38a6a6082ce0
SHA2565e014f51504d2865151ca025a0660004cda6001e41fb82864059e365d69a0168
SHA512aef8118e6ebf3084a4efe155788cc3e7a778b4af5fe9fb0a0edd102233cffdbdb4985d8c9846509d3f587dd3010b9a46fb0bab572370b8dab7c981d6074b392a
-
/data/user/0/gyjjnzuynoytqwsbmheodkojrik.cgrgloxtlzzugaindmabhp.nmjegswkuutjtt/app_DynamicOptDex/oat/YieIMdU.json.cur.prof
Filesize337B
MD57b96b24f808d6a8bc016475c157e6207
SHA1c24ad5d12208f35315f27db390f004939a1cb138
SHA2564881f3cab45013c71a8609276049be6c9f75948e01e43dde22d762eb6efef39e
SHA512a250e18fcf212f2951b07ffc88d50b0e17347303f078e4fec9d1327fb14b94ff939bc59b0039330302081b6e3d76703a26506126725f57c565f7864e5a82523c