Analysis

  • max time kernel
    168s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240506-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240506-enlocale:en-usos:android-11-x64system
  • submitted
    08-05-2024 22:30

General

  • Target

    E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk

  • Size

    2.0MB

  • MD5

    df2cca4519794070ad7671435a3a1e11

  • SHA1

    e3c369e86eabdba643e0a4c3f34488bc64b11789

  • SHA256

    e1d863e16d0585609677790971d97a394376e1bb6a96da221719738249669c5a

  • SHA512

    d7be25260a822fa98352cd56ca815eaecf2f6d03f7538613f0b9bb2a3cf3022e728db9321000a3ec575cfabb81011e16fe24fcb22026a9a5ad01442f4ae97278

  • SSDEEP

    49152:Klmh0ViOZW/Xmg2fPY+TaTK9kjEGUXvHcO8:ph0boXmg2fLa+9k80Z

Malware Config

Extracted

Family

alienbot

C2

http://kurutses11.com

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus payload 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Prevents application removal 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to prevent removal.

  • Removes its main activity from the application launcher 1 TTPs 9 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda
    1⤵
    • Makes use of the framework's Accessibility service
    • Prevents application removal
    • Removes its main activity from the application launcher
    • Checks CPU information
    • Checks memory information
    • Loads dropped Dex/Jar
    • Obtains sensitive information copied to the device clipboard
    • Queries account information for other applications stored on the device
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Schedules tasks to execute at a specified time
    PID:4818

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/oat/rRJ.json.cur.prof

    Filesize

    323B

    MD5

    3c58b55e1f2d627ec075bd0e8a81d022

    SHA1

    46a185171fb7f2a695e04b15c0477d81f06f1adf

    SHA256

    4c2d162a96dbe34d538db826e1d3b3bbe791a54f21147a8a93b12b81101cf184

    SHA512

    be39917c25043683a27b5927c05c0a64947adf770c6060607736e18a889df6fda3674d56bef10f03d0b424512ee7dde0a425e8515a7ee28cb900b4b5b84845f7

  • /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json

    Filesize

    675KB

    MD5

    219636a11984fb84c096b67f792e9c53

    SHA1

    b9476de92ed2e3c4e8cf457d6ae7de15f8bec064

    SHA256

    183b51156c56a81162b7d475d2cb3c0a3f89f0ffa543cb91659a16d6425f5c87

    SHA512

    9d8734dc0c33265c2401a1a4a0729823a894811d612dd48ed67101a90166f6e8258398a66c9810b64ab40ac95d413450d1f071efd6ad1e78e26e7a39967d220b

  • /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json

    Filesize

    675KB

    MD5

    520cba6cf77420ff0f0a1b5c7d75999e

    SHA1

    b6995eb32ad9947c9529e4cbce12bd45798dde7d

    SHA256

    81d077e47b63c07b4d16cc1a8f3c97220bffa53857b9dd9abb3a1404c7789e64

    SHA512

    30ac1d3989809cf5377240d76c90b56304b881015a28baeeba001216861ed845a4277b292fec27c37f1b6403df0bf15f4692a20db8e46c1cba5d17cf56e82b04