Analysis
-
max time kernel
3525427s -
max time network
151s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
31-12-2023 09:24
Static task
static1
Behavioral task
behavioral1
Sample
30c3f2a449c75990d049b3245f2df2e9.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
30c3f2a449c75990d049b3245f2df2e9.apk
Resource
android-x64-20231215-en
General
-
Target
30c3f2a449c75990d049b3245f2df2e9.apk
-
Size
3.3MB
-
MD5
30c3f2a449c75990d049b3245f2df2e9
-
SHA1
af3e95111238f858b94a3a7a8bb4f81a6579dcf7
-
SHA256
c23475ee87755d08d0ed5aadf879454724349798e811af0c33bc20d9c61a01d9
-
SHA512
d0a08c8208e565afb94ea96b22ec4625412a62153c6cdf4e1c87bff26aecf6f0652c091702703c9c8e6a82decffc9d858eca955d63140ed2e14b4d47acfcd879
-
SSDEEP
98304:HG1UR3pqsr74qEOPYD5v7XYhi/WPEMsdAL/u:HG1Gpqsr745v7ohi/Wsyy
Malware Config
Extracted
alienbot
http://34.89.151.222
Extracted
alienbot
http://34.89.151.222
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
resource yara_rule behavioral3/files/fstream-2.dat family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId field.tackle.urge Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId field.tackle.urge -
pid Process 4524 field.tackle.urge 4524 field.tackle.urge 4524 field.tackle.urge 4524 field.tackle.urge 4524 field.tackle.urge 4524 field.tackle.urge 4524 field.tackle.urge 4524 field.tackle.urge -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/field.tackle.urge/app_DynamicOptDex/dHfCId.json 4524 field.tackle.urge /data/user/0/field.tackle.urge/app_DynamicOptDex/dHfCId.json 4524 field.tackle.urge -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock field.tackle.urge -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS field.tackle.urge
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD5b6317f00c0896935dcc039e39db41155
SHA194a23bed8bdfdfc25bdee762334cfb31681c8456
SHA256306c585838aa882bdf9269a68fd8178f62353284926bd65e64a444e66b127175
SHA5126db9049b9a388824bf5f602199b08f486d4e1dc84ddb784508ca96847a56bad9a6e829b27eb2de25ba3b55e989663fe79b79f9fa238009adba04cd053d5db557
-
Filesize
644KB
MD5f07dbd5bc590633ae3fe1ec9605a73ea
SHA131f90f8940a86ec1eb2adf6e3c8982b44a043b73
SHA2564725e0121feaf15c38e96f9712cb5cede3ccf183da857e864bebc1c16b692bba
SHA5124344fc7a7f0cf5202ddcab8f8c00111863d041e28bd2ad832c469f80cccf710cccd2be9f2b13b43eda8e19d9ec5383d9375eabb779b49fb19965c05251abace5
-
Filesize
377B
MD54fdc1f0ce68461b2b474a41d0de6ef49
SHA101258a81d5eae22d0834ae37d32e25c41a71912b
SHA25649afa5a62ee70015084a531d8c187fd74102cf8bece7838e7610432e14904d40
SHA512c635c7d01048a249c86c35fefc2c74e76a0ddc17684f8e6c6866dbc734be2234228995cea82c6d9cb9a604c553431468a1e299fde5c09aa55c2f723d2e1711b6