Analysis
-
max time kernel
17s -
max time network
178s -
platform
android_x86 -
resource
android-x86-arm-20240506-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system -
submitted
08-05-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
-
Size
2.0MB
-
MD5
df2cca4519794070ad7671435a3a1e11
-
SHA1
e3c369e86eabdba643e0a4c3f34488bc64b11789
-
SHA256
e1d863e16d0585609677790971d97a394376e1bb6a96da221719738249669c5a
-
SHA512
d7be25260a822fa98352cd56ca815eaecf2f6d03f7538613f0b9bb2a3cf3022e728db9321000a3ec575cfabb81011e16fe24fcb22026a9a5ad01442f4ae97278
-
SSDEEP
49152:Klmh0ViOZW/Xmg2fPY+TaTK9kjEGUXvHcO8:ph0boXmg2fLa+9k80Z
Malware Config
Extracted
alienbot
http://kurutses11.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
Processes:
resource yara_rule /data/data/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json family_cerberus /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json family_cerberus -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdapid process 4267 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process File opened for read /proc/cpuinfo mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process File opened for read /proc/meminfo mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/oat/x86/rRJ.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json 4267 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json 4293 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/oat/x86/rRJ.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json 4267 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Framework service call android.app.IActivityManager.registerReceiver mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda
Processes
-
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Requests enabling of the accessibility settings.
PID:4267 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/oat/x86/rRJ.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4293
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
675KB
MD5219636a11984fb84c096b67f792e9c53
SHA1b9476de92ed2e3c4e8cf457d6ae7de15f8bec064
SHA256183b51156c56a81162b7d475d2cb3c0a3f89f0ffa543cb91659a16d6425f5c87
SHA5129d8734dc0c33265c2401a1a4a0729823a894811d612dd48ed67101a90166f6e8258398a66c9810b64ab40ac95d413450d1f071efd6ad1e78e26e7a39967d220b
-
Filesize
675KB
MD5520cba6cf77420ff0f0a1b5c7d75999e
SHA1b6995eb32ad9947c9529e4cbce12bd45798dde7d
SHA25681d077e47b63c07b4d16cc1a8f3c97220bffa53857b9dd9abb3a1404c7789e64
SHA51230ac1d3989809cf5377240d76c90b56304b881015a28baeeba001216861ed845a4277b292fec27c37f1b6403df0bf15f4692a20db8e46c1cba5d17cf56e82b04
-
Filesize
675KB
MD53a721e3afbc6b68c3edb878e8eabc63d
SHA179f254035556273b06a12b44c8fe6265848171e1
SHA2568e4c9997935bb93b2915e25f37a6bf966ce1ed134a906b0f4830d36ab5714255
SHA5127347c44c5a475a5987a243a4b13c05b0f20d18ce53a4f9ff02ff8c85198c1802c651a9d5478bab298636e017c45da25f47010573bc88b2823c3377ba10b63790