Analysis
-
max time kernel
2462896s -
max time network
149s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
20-12-2023 09:01
Static task
static1
Behavioral task
behavioral1
Sample
9975519e1ae9ceffc6a7841b8c26fa356b98c0fd1e48df80bad49865066c28c7.apk
Behavioral task
behavioral2
Sample
9975519e1ae9ceffc6a7841b8c26fa356b98c0fd1e48df80bad49865066c28c7.apk
Resource
android-x64-20231215-en
General
-
Target
9975519e1ae9ceffc6a7841b8c26fa356b98c0fd1e48df80bad49865066c28c7.apk
-
Size
2.3MB
-
MD5
1a3388bc2de001556f2ec1af473f8989
-
SHA1
d7d74bdef5b6ab2d4478cfec4e0181feb155ed45
-
SHA256
9975519e1ae9ceffc6a7841b8c26fa356b98c0fd1e48df80bad49865066c28c7
-
SHA512
419a9afdb95fa5764d0667a834e69f862eddb6301b74ec23986f688a72792fc7dc26187dff9edfc7ee791664362abbaa94196c4ed452f133623fcec8c1d50e38
-
SSDEEP
49152:cBa82ndZfnJsufx1sb0IXJPNlKg9bpHC7zVgaQWiuk8fNwUUOfT+gynKmCiam7A6:dXSYg+Ozg/UBHCLm7A6Zr
Malware Config
Extracted
alienbot
http://kucsas.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/data/idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy/app_DynamicOptDex/bZoFML.json family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufydescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy -
Processes:
idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufypid process 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufyioc pid process /data/user/0/idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy/app_DynamicOptDex/bZoFML.json 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy /data/user/0/idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy/app_DynamicOptDex/bZoFML.json 4990 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD5df1e9509ced3c76f4e60f93e2fb37f81
SHA13f970cf2a514e7f668ae3645a41d80ead1922588
SHA25659da792f25dbde544145c489bce848eda9d4175701aec14f2f170cbbb2829ad7
SHA5124d6e8969ea2483558e7cd0a81d11a045750f0f7616f60fc87059ba910ccd532d0bcf8f750f43599d7e8c28f881257fddf9ff636cf35fcd021b0111114790bb9c
-
Filesize
713KB
MD510a784a4bf5028a5332c9abd5b25089e
SHA13fdbfb8baf4428fcb2dd5e126af0ba3d8c8538d4
SHA256cea01f1b9897a2f7290f0b06c21b3d966469c813c5d59cb109eec9c0b3770513
SHA5128d610beb95c1fd354a95c4ff6a0ed25c592d4bd79db38bc392c2b9aaefbf34b5f464b9a58d2fa6c83c704b9ef4891d4b7b6d7847dceb95f69d69dcb21989bfc4
-
Filesize
406B
MD537a85e7081e318256065a480a4dc9654
SHA139d19df9cee3f1107e2d391e8a49deb84be3958f
SHA25679197085a429910b3e90b081e7cc80b6f7a2fd477be4457244d3cd8574406b0f
SHA51224753f2520184e7459f707557402d761c81738fce92ae06c62c119f30bdf48bc8e55490e99923cfdd1efd3ac071c32f5c4c83b78123d2892c28ef2040e6f6746