Analysis
-
max time kernel
2786811s -
max time network
160s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
24-12-2023 06:07
Static task
static1
Behavioral task
behavioral1
Sample
e42988084f6d064c900d922f374a33fdbbefa14fd420ce1df1d5d632b851f560.apk
Behavioral task
behavioral2
Sample
e42988084f6d064c900d922f374a33fdbbefa14fd420ce1df1d5d632b851f560.apk
Resource
android-x64-20231215-en
General
-
Target
e42988084f6d064c900d922f374a33fdbbefa14fd420ce1df1d5d632b851f560.apk
-
Size
3.6MB
-
MD5
a7800a5e355a0adc53c6ebcea6fa9a08
-
SHA1
f3da3c9707625acb37971452262b158739e243c5
-
SHA256
e42988084f6d064c900d922f374a33fdbbefa14fd420ce1df1d5d632b851f560
-
SHA512
0d24cb353da3b942a43ea6fe35f55febc3254fa64062cac4c9c1afb43cbaf6318f7c5fdde63c276aeadabb0e4ef5db8a8e9dba80dca8ea9d36b4f08a28413330
-
SSDEEP
98304:llhFH/oe6k2esxFH/6KbMCv/XEB6NFOw2Ycb9fP:xqE2BxFCK4w/XqwV2Yc5X
Malware Config
Extracted
alienbot
http://bilmem23x.digital
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/user/0/call.toward.black/app_DynamicOptDex/DE.json family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
call.toward.blackdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId call.toward.black Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId call.toward.black -
Processes:
call.toward.blackpid process 4622 call.toward.black 4622 call.toward.black 4622 call.toward.black 4622 call.toward.black 4622 call.toward.black -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
call.toward.blackioc pid process /data/user/0/call.toward.black/app_DynamicOptDex/DE.json 4622 call.toward.black /data/user/0/call.toward.black/app_DynamicOptDex/DE.json 4622 call.toward.black -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
call.toward.blackdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS call.toward.black
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
728KB
MD53e835dea8eb7ec72ce233a64fb033e70
SHA1021d92b8c01ef611542ba1f34e92c2cc37c75eff
SHA25698c4c65e8083ceb7bf204c4959e7d290a1d4401686f06f226a62734da4138b7d
SHA5125946ed63e2e36817303d1b01cadb1566df11706a1bf2750708494e89b88b3b4348e3cb609a750883238a3c14f1b4338a75af3739704726bdb6fc1a19f392549b
-
Filesize
728KB
MD51bf3ddfe0d4044dee52234e6eb7cc925
SHA1ad646c5b50e4050ca5b79b3360cd9e1bb84ddc9e
SHA2564de189e1fdc6d8305a20c8aa9a7420d106c5d8dd0fd1d3a5f06142eb15721c08
SHA512cee67c49817b34dff8899001728b7aa932bc108a23c3d352e905fdeae650459f1be68a3642700ad2d9834b06d567f5018a7c48540ecb7aab8eea1321dabfabe5
-
Filesize
319B
MD56256af082a24582068c0b87b2284d58b
SHA1c92c46a4522bda37d44d87b6c4fe8bf1e16cf3ed
SHA256881cfbc9a1da135b102bd4daded8bf1f42a0f19f90eabd2da407cfd919282640
SHA512c47e237936fb792bf2bacb91da758cc7c49f6fc2973be2db08e6c22c5bb68e5ac5ffcbae0f9ee5884ec4220e105f7be5a9a63fc3d2afb19b72a4df6f9e44e9cb