Analysis
-
max time kernel
3789109s -
max time network
160s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
26-12-2023 20:00
Static task
static1
Behavioral task
behavioral1
Sample
8a9e2ecc89f8190eeda6a5574222d764.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8a9e2ecc89f8190eeda6a5574222d764.apk
Resource
android-x64-20231215-en
General
-
Target
8a9e2ecc89f8190eeda6a5574222d764.apk
-
Size
1.5MB
-
MD5
8a9e2ecc89f8190eeda6a5574222d764
-
SHA1
cbda65c114994affc4f0a87567398c0a11e42776
-
SHA256
1c530b6be1b94f43588b7a3cc3bf3c41b4ad5cc1c687ca6a64be628019d49f3c
-
SHA512
c02a92f23171221beaae3f75cb869947e9f661c6cd20cd1ead675e8ece1197234087cd1bf657e91094fe49295931197bad12f73e0596552e0682a65934cc084f
-
SSDEEP
24576:H547kbuQ7rkgnwIlnrfH/4w2TedoHNj/Ldz4iid2UurtNc3+FTrtIOk9RKgJ:zpnwI9rfH/3dWNrLdz40dRFvtIOk9oI
Malware Config
Extracted
alienbot
http://operolstels12.site
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/data/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/lsAQxI.json family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm -
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmpid process 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmioc pid process /data/user/0/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/lsAQxI.json 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm /data/user/0/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/lsAQxI.json 4989 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD502d6e5c8c2337819ace0deabfa00916e
SHA1b8c87309d63960c6ff134a0c0c6244243be49efc
SHA2563bb6d4ac366b9c3e319b5cb9be1fd5b6d6f4a90aae6b86015b7322134b66bd67
SHA512f44d3d5c5bba50fdff5ed49179b2068edd95f26c452a5d7732df8bbfd78bd0387d579c6eca876ea5c76956f45b2028ffb9ab0c545842cb64cd7492ced684888a
-
Filesize
697KB
MD533dcd9ea315e89c4bca5a277ede79580
SHA1c5e3dfdb2457cbd7a017ea072b87d2a27fc44631
SHA25610b1f93f0ed459e9ae7d783e45589988dd1582db26a8bccf44d8e2e25f97a817
SHA5122459c321cfc895ba175e5ad539def3fdd358c9bd2bcfc8a67865ed2ee5c3afe8c60824bfa19b4ab45ac6ac3f6137809df1ba93b8d012b248cb7c6be8a2202c57
-
/data/data/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/oat/lsAQxI.json.cur.prof
Filesize372B
MD5a682e046db07688f339004280fc4df09
SHA113f1b8e7180950638256283a28f7060571aedabb
SHA256a4cfc500ba063f8d1480a7a23050a9ba804bb9d7ecd15b38267f37fb6b0ba053
SHA5120e27422d30ac20d510661af3e1d11c5d16e2f828091f0e93f68049f2302a0cbfe2c9365e5eec8da03094c7d52e4c057397d206ffa477e98e60813da85d0cfee1