Analysis
-
max time kernel
3396151s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
28-12-2023 05:54
Static task
static1
Behavioral task
behavioral1
Sample
c964e7894329592360aff35b7b23205e.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
c964e7894329592360aff35b7b23205e.apk
Behavioral task
behavioral3
Sample
c964e7894329592360aff35b7b23205e.apk
General
-
Target
c964e7894329592360aff35b7b23205e.apk
-
Size
4.1MB
-
MD5
c964e7894329592360aff35b7b23205e
-
SHA1
cfecbbb47621aae31c38dd3627731362faf1638b
-
SHA256
e3242bbd0a14045280fe57c7eca7c16a332a79edf58662c3e4ffa825bf78568c
-
SHA512
439c8bc169dac94fedb73c2e8c77c09d6cd0848765ec6ebe41fb49464ce6b48c1c3dee7c925da34c2b91a39604b0365eddba8fe60cf5946c0bd7128e51f30bf0
-
SSDEEP
98304:GVPE9wlCb8u8aYe/l5awpIK9bRjrimV9uCQeNGxmhdLp:GVPE9WCbx8azlsm1cs9UeNjdl
Malware Config
Extracted
alienbot
http://vaydemenescomeres.net
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_cerberus behavioral1/memory/4487-1.dex family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId damage.found.shrug Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId damage.found.shrug -
pid Process 4487 damage.found.shrug -
Checks Android system properties for emulator presence. 1 IoCs
description ioc Process Accessed system property key: ro.product.model damage.found.shrug -
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/damage.found.shrug/app_DynamicOptDex/ygDNLCw.json 4487 damage.found.shrug /data/user/0/damage.found.shrug/app_DynamicOptDex/ygDNLCw.json 4543 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/damage.found.shrug/app_DynamicOptDex/ygDNLCw.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/damage.found.shrug/app_DynamicOptDex/oat/x86/ygDNLCw.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/damage.found.shrug/app_DynamicOptDex/ygDNLCw.json 4487 damage.found.shrug -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS damage.found.shrug
Processes
-
damage.found.shrug1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4487 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/damage.found.shrug/app_DynamicOptDex/ygDNLCw.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/damage.found.shrug/app_DynamicOptDex/oat/x86/ygDNLCw.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4543
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476B
MD595eb519c5b7d486d34bec1224816ea56
SHA160558a28afef063e62a8e8caafeb32855d976d35
SHA25612e062e1c6d6947297b85dc52416d4f58b0f66f16ef1714a41f5cf51a162cabc
SHA51238c80d3772a5ebc3d3ec6c1aa54e1050bff8b2b464c43d85793396d3da6644a9f4d8ab401ce715ba83a79e7cfa9832d802aa73419cb95e79e0d7a53f1e1a0fde
-
Filesize
682KB
MD55f8a4837f4def1b09b0f188673123d22
SHA11e3920332d14db0c60f8e86c9351505d4a1331e0
SHA256dbf46ae64f71b721f836f9c226449b40668031971524f1fc3120794c9fc2e67e
SHA51200394441aeb7109d38d67b26920d5931c17a5f19fcc9e56a5c016bce5c8d753c7b713b92774c09d676e2f1f24e1ef0bf7275a768178a5b2be69bc82b0debf52e
-
Filesize
682KB
MD5d0cc1d856bc60542ac6bbd8b52f219ba
SHA142e30dadf7bbb78e547e412278b51f8803a039e6
SHA25615c592305a47f5711e95708cd693b06ad287e2bb554a1ea27035aadba26af0db
SHA512bf7398b9fd56f374959b26a9f3aece8c951839f159ea92cd244cefbf064dce3bd722777697d87f55da6e2c703289a30cc8b6f2e90432af207c10829ab91f53bd
-
Filesize
682KB
MD581496875f0a3e1b4b5fe691111943c20
SHA159ab593e6bcfa6c4fb7e12e2b60e3e8b7f521874
SHA256f3c691eb8f42864d202f719c9cdc5bee60b33b8c2c03939fcd1234c47079df07
SHA512a6d8ea79aa6b0b730cadc0444fe49a450963b910ffd947ddead69af1eaf8bfa13d85ae8d3723a20d009e496d76461640eac25c222fb39505b67b9926cfb9784f