Analysis
-
max time kernel
150s -
max time network
140s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
02-02-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
8a9e2ecc89f8190eeda6a5574222d764.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8a9e2ecc89f8190eeda6a5574222d764.apk
Resource
android-x64-20231215-en
General
-
Target
8a9e2ecc89f8190eeda6a5574222d764.apk
-
Size
1.5MB
-
MD5
8a9e2ecc89f8190eeda6a5574222d764
-
SHA1
cbda65c114994affc4f0a87567398c0a11e42776
-
SHA256
1c530b6be1b94f43588b7a3cc3bf3c41b4ad5cc1c687ca6a64be628019d49f3c
-
SHA512
c02a92f23171221beaae3f75cb869947e9f661c6cd20cd1ead675e8ece1197234087cd1bf657e91094fe49295931197bad12f73e0596552e0682a65934cc084f
-
SSDEEP
24576:H547kbuQ7rkgnwIlnrfH/4w2TedoHNj/Ldz4iid2UurtNc3+FTrtIOk9RKgJ:zpnwI9rfH/3dWNrLdz40dRFvtIOk9oI
Malware Config
Extracted
alienbot
http://operolstels12.site
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/user/0/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/lsAQxI.json family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm -
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmpid process 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmioc pid process /data/user/0/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/lsAQxI.json 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm /data/user/0/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/lsAQxI.json 4630 lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputmdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD502d6e5c8c2337819ace0deabfa00916e
SHA1b8c87309d63960c6ff134a0c0c6244243be49efc
SHA2563bb6d4ac366b9c3e319b5cb9be1fd5b6d6f4a90aae6b86015b7322134b66bd67
SHA512f44d3d5c5bba50fdff5ed49179b2068edd95f26c452a5d7732df8bbfd78bd0387d579c6eca876ea5c76956f45b2028ffb9ab0c545842cb64cd7492ced684888a
-
Filesize
697KB
MD533dcd9ea315e89c4bca5a277ede79580
SHA1c5e3dfdb2457cbd7a017ea072b87d2a27fc44631
SHA25610b1f93f0ed459e9ae7d783e45589988dd1582db26a8bccf44d8e2e25f97a817
SHA5122459c321cfc895ba175e5ad539def3fdd358c9bd2bcfc8a67865ed2ee5c3afe8c60824bfa19b4ab45ac6ac3f6137809df1ba93b8d012b248cb7c6be8a2202c57
-
/data/user/0/lcpratmbqgenqximrlium.akur.leidcbirxeoxjzldtcfmdruputm/app_DynamicOptDex/oat/lsAQxI.json.cur.prof
Filesize330B
MD5354bb057a0918ac0f88f980e6695683f
SHA1654ecfced49b470e8ec74d9fd373d33d2131e00c
SHA256639a342808c4a3d3fd64a0572e86c24693c31767ef737eeca2eb4533d9ddcfe4
SHA5124e723602e1873db855e2e190502d1ac77812086776ef9dc5e3df4107498d056ab47a79e8eba7e7da6901e4e1ee952bc37c2a2e561e24ffd47506582ffa3cba7d