Analysis
-
max time kernel
152s -
max time network
160s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
03-02-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
8d244ac025fb51c1348003dc9c3c3ea2.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8d244ac025fb51c1348003dc9c3c3ea2.apk
Resource
android-x64-20231215-en
General
-
Target
8d244ac025fb51c1348003dc9c3c3ea2.apk
-
Size
3.3MB
-
MD5
8d244ac025fb51c1348003dc9c3c3ea2
-
SHA1
fab5bd3e1504011efe253dfc344852f6b5c644a1
-
SHA256
ee5632e3c0717693c9ab993c2b0c5b6edb503383215895f99800d915d92d1b8e
-
SHA512
83b782add0d8aeb33e18e29749c30665fe9139a8926e8c01c143f1299671633525c25a9c727b9e2f542b3763c031f7116669a5d937c60c40117a6309b0881caa
-
SSDEEP
49152:771bqaWjVs+yld286HLJ9USJ1Wad4g7f/S6/LB+hYcx19CFMbDTt/u6DI6GHwZyM:WVsjl/UoSqaXqIF+kaDTQAyCjenE
Malware Config
Extracted
alienbot
https://instagrambuyukprofil.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/data/umbrella.thought.elevator/app_DynamicOptDex/dUlxss.json family_cerberus -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
umbrella.thought.elevatordescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId umbrella.thought.elevator Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId umbrella.thought.elevator -
Processes:
umbrella.thought.elevatorpid process 4982 umbrella.thought.elevator 4982 umbrella.thought.elevator 4982 umbrella.thought.elevator 4982 umbrella.thought.elevator 4982 umbrella.thought.elevator 4982 umbrella.thought.elevator 4982 umbrella.thought.elevator 4982 umbrella.thought.elevator -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
umbrella.thought.elevatorioc pid process /data/user/0/umbrella.thought.elevator/app_DynamicOptDex/dUlxss.json 4982 umbrella.thought.elevator /data/user/0/umbrella.thought.elevator/app_DynamicOptDex/dUlxss.json 4982 umbrella.thought.elevator -
Acquires the wake lock 1 IoCs
Processes:
umbrella.thought.elevatordescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock umbrella.thought.elevator
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5b09c79c73e85c95d5409091410312d62
SHA165844a73e7830d96ab9d8f82600b27ad2b7e97e2
SHA256af0d4e3075b52f8f316710bed19fa065c0422e19cda2c2b0ab3da6c542c2b6db
SHA512b9884524de07cb35bcc1413baa75a1224418cfdbde13100ee0206ed8289331231a43d0139bc58aaa5a74269b4d89b4fb8e33798b97259dc6dfc8251a5dc108f9
-
Filesize
750KB
MD5dfabaf12f2525cfc93875294f27aa02e
SHA15ad1e3c4e216ceaf232d7efe48100bd65e7ea0cc
SHA2563f9c6c381b8eb307664813ccc4815ae24baa1bd41224c840f79acb65c95b9e49
SHA51279fef0ae5defbdaaf8e12c41e789c8ed511bc1c11d060860d79fb0a3017b95cbd262d893b846d79b55efd38c8a4a7c8d1ed027ca1d4f8ab4701460a496cb920e
-
Filesize
411B
MD53b2250444f6b85ac62388c3e3bd788a6
SHA1ff442f78686e059f97c2c14531f834255b640774
SHA2563add0420d7bd6d8148961b774dc776602c864386ab034e34a0217e39c39ddf0f
SHA512a978cc687f7b40fdfca8aafabb7971db6fa316dcd337633e16119972894c8d7f93fe7c6b79a5730f35e3493042fc3df479826945a737aa5e7b3d7ca4ab4c3011