Analysis
-
max time kernel
168s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240506-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240506-enlocale:en-usos:android-11-x64system -
submitted
08-05-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
E1D863E16D0585609677790971D97A394376E1BB6A96DA221719738249669C5A.apk
-
Size
2.0MB
-
MD5
df2cca4519794070ad7671435a3a1e11
-
SHA1
e3c369e86eabdba643e0a4c3f34488bc64b11789
-
SHA256
e1d863e16d0585609677790971d97a394376e1bb6a96da221719738249669c5a
-
SHA512
d7be25260a822fa98352cd56ca815eaecf2f6d03f7538613f0b9bb2a3cf3022e728db9321000a3ec575cfabb81011e16fe24fcb22026a9a5ad01442f4ae97278
-
SSDEEP
49152:Klmh0ViOZW/Xmg2fPY+TaTK9kjEGUXvHcO8:ph0boXmg2fLa+9k80Z
Malware Config
Extracted
alienbot
http://kurutses11.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
Processes:
resource yara_rule /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json family_cerberus -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdapid process 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process File opened for read /proc/cpuinfo mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process File opened for read /proc/meminfo mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdaioc pid process /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda /data/user/0/mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda/app_DynamicOptDex/rRJ.json 4818 mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjdadescription ioc process Framework service call android.app.job.IJobScheduler.schedule mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda
Processes
-
mgzfzuxeahbcqzfuyqlqw.gpqumixninwa.beasjda1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries account information for other applications stored on the device
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4818
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD53c58b55e1f2d627ec075bd0e8a81d022
SHA146a185171fb7f2a695e04b15c0477d81f06f1adf
SHA2564c2d162a96dbe34d538db826e1d3b3bbe791a54f21147a8a93b12b81101cf184
SHA512be39917c25043683a27b5927c05c0a64947adf770c6060607736e18a889df6fda3674d56bef10f03d0b424512ee7dde0a425e8515a7ee28cb900b4b5b84845f7
-
Filesize
675KB
MD5219636a11984fb84c096b67f792e9c53
SHA1b9476de92ed2e3c4e8cf457d6ae7de15f8bec064
SHA256183b51156c56a81162b7d475d2cb3c0a3f89f0ffa543cb91659a16d6425f5c87
SHA5129d8734dc0c33265c2401a1a4a0729823a894811d612dd48ed67101a90166f6e8258398a66c9810b64ab40ac95d413450d1f071efd6ad1e78e26e7a39967d220b
-
Filesize
675KB
MD5520cba6cf77420ff0f0a1b5c7d75999e
SHA1b6995eb32ad9947c9529e4cbce12bd45798dde7d
SHA25681d077e47b63c07b4d16cc1a8f3c97220bffa53857b9dd9abb3a1404c7789e64
SHA51230ac1d3989809cf5377240d76c90b56304b881015a28baeeba001216861ed845a4277b292fec27c37f1b6403df0bf15f4692a20db8e46c1cba5d17cf56e82b04