Analysis
-
max time kernel
169s -
max time network
177s -
platform
android_x64 -
resource
android-x64-20240506-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240506-enlocale:en-usos:android-10-x64system -
submitted
08-05-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
-
Size
2.0MB
-
MD5
df2cca4519794070ad7671435a3a1e11
-
SHA1
e3c369e86eabdba643e0a4c3f34488bc64b11789
-
SHA256
e1d863e16d0585609677790971d97a394376e1bb6a96da221719738249669c5a
-
SHA512
d7be25260a822fa98352cd56ca815eaecf2f6d03f7538613f0b9bb2a3cf3022e728db9321000a3ec575cfabb81011e16fe24fcb22026a9a5ad01442f4ae97278
-
SSDEEP
49152:Klmh0ViOZW/Xmg2fPY+TaTK9kjEGUXvHcO8:ph0boXmg2fLa+9k80Z
Malware Config
Extracted
alienbot
http://kurutses11.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
resource yara_rule behavioral2/files/fstream-2.dat family_cerberus -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
pid Process 5058 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 5058 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 5058 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json 5058 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json 5058 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda
Processes
-
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:5058
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404B
MD5efef67d12c790c09b09d23657f819d55
SHA19f71ac5ddbc1451573a3a13f025c1d7dd4a67eda
SHA2566e1cd0e39e55123c619d8bc4a278acd513621f2d20036c016c81fb18350f5087
SHA5120e29b788c3050ce4c103123e1b4dbf0b9ca9b980e246b2c5574a7eebca6289b278a7b50f56acad843a6e88456f1c555ec2e678f649c65aaa9f13ebe9e8c1a4c2
-
Filesize
675KB
MD5219636a11984fb84c096b67f792e9c53
SHA1b9476de92ed2e3c4e8cf457d6ae7de15f8bec064
SHA256183b51156c56a81162b7d475d2cb3c0a3f89f0ffa543cb91659a16d6425f5c87
SHA5129d8734dc0c33265c2401a1a4a0729823a894811d612dd48ed67101a90166f6e8258398a66c9810b64ab40ac95d413450d1f071efd6ad1e78e26e7a39967d220b
-
Filesize
675KB
MD5520cba6cf77420ff0f0a1b5c7d75999e
SHA1b6995eb32ad9947c9529e4cbce12bd45798dde7d
SHA25681d077e47b63c07b4d16cc1a8f3c97220bffa53857b9dd9abb3a1404c7789e64
SHA51230ac1d3989809cf5377240d76c90b56304b881015a28baeeba001216861ed845a4277b292fec27c37f1b6403df0bf15f4692a20db8e46c1cba5d17cf56e82b04