Analysis
-
max time kernel
145s -
max time network
154s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
02-02-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
8a9e2ecc89f8190eeda6a5574222d764.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8a9e2ecc89f8190eeda6a5574222d764.apk
Resource
android-x64-20231215-en
General
-
Target
8a9e2ecc89f8190eeda6a5574222d764.apk
-
Size
1.5MB
-
MD5
8a9e2ecc89f8190eeda6a5574222d764
-
SHA1
cbda65c114994affc4f0a87567398c0a11e42776
-
SHA256
1c530b6be1b94f43588b7a3cc3bf3c41b4ad5cc1c687ca6a64be628019d49f3c
-
SHA512
c02a92f23171221beaae3f75cb869947e9f661c6cd20cd1ead675e8ece1197234087cd1bf657e91094fe49295931197bad12f73e0596552e0682a65934cc084f
-
SSDEEP
24576:H547kbuQ7rkgnwIlnrfH/4w2TedoHNj/Ldz4iid2UurtNc3+FTrtIOk9RKgJ:zpnwI9rfH/3dWNrLdz40dRFvtIOk9oI
Malware Config
Extracted
alienbot
http://operolstels12.site
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/data/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/lsAQxI.json family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm -
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmpid process 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmioc pid process /data/user/0/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/lsAQxI.json 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm /data/user/0/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/lsAQxI.json 5057 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD502d6e5c8c2337819ace0deabfa00916e
SHA1b8c87309d63960c6ff134a0c0c6244243be49efc
SHA2563bb6d4ac366b9c3e319b5cb9be1fd5b6d6f4a90aae6b86015b7322134b66bd67
SHA512f44d3d5c5bba50fdff5ed49179b2068edd95f26c452a5d7732df8bbfd78bd0387d579c6eca876ea5c76956f45b2028ffb9ab0c545842cb64cd7492ced684888a
-
Filesize
697KB
MD533dcd9ea315e89c4bca5a277ede79580
SHA1c5e3dfdb2457cbd7a017ea072b87d2a27fc44631
SHA25610b1f93f0ed459e9ae7d783e45589988dd1582db26a8bccf44d8e2e25f97a817
SHA5122459c321cfc895ba175e5ad539def3fdd358c9bd2bcfc8a67865ed2ee5c3afe8c60824bfa19b4ab45ac6ac3f6137809df1ba93b8d012b248cb7c6be8a2202c57
-
/data/data/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/oat/lsAQxI.json.cur.prof
Filesize388B
MD5f6c9441d5c016ddee84a1deb8f510f51
SHA15b420c069a1b5d96194b1f304881e70374d5f725
SHA256783073af62af69eacc20e38f118ecc8f8105aa2df65d01c4fe1b1b87d6bfcf36
SHA51286d23429314729f117842add4680ad5b81d3ac20726f333f16fc3775f6749a209d8d1e94e84a5edcd403b547dd1f4efc86a88bad97ab95d8ccff6f1fce12b44f