Analysis
-
max time kernel
179s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
17-05-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
2e73cd5a5324c97285fd48800c51bed1.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
2e73cd5a5324c97285fd48800c51bed1.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
2e73cd5a5324c97285fd48800c51bed1.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
2e73cd5a5324c97285fd48800c51bed1.apk
-
Size
1.5MB
-
MD5
2e73cd5a5324c97285fd48800c51bed1
-
SHA1
f8c36b4aaffa874beba36a30df40cc57795a61ca
-
SHA256
48d3387a87d0553bf792cac36a138b6f6a44c1ae02afb425fc5eb814be78f14f
-
SHA512
a74e907ac37d3b06f1779ac13b7c7494fb60e893f2d9ac0a985bbc1637fb12dcf3ab08f1d2cf4aa374c12f963362ee6750e03590c2bc64db7d29995a7789b9c6
-
SSDEEP
24576:w2gRFNemMOZC4AxRq7TlCw4n5lKgMrtTCdxyDhw5VrWOMHHi3btRJPz4k3XqEcyI:rgFhNC7q714boT+x8hw5VbX3bX6knqII
Malware Config
Extracted
alienbot
http://kitapkilidi.online
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
Processes:
resource yara_rule /data/data/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json family_cerberus /data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json family_cerberus -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzpid process 4265 hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process Accessed system property key: ro.product.model hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process File opened for read /proc/cpuinfo hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process File opened for read /proc/meminfo hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/oat/x86/Ygg.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json 4265 hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz /data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json 4327 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/oat/x86/Ygg.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json 4265 hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process Framework service call android.accounts.IAccountManager.getAccountsAsUser hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process Framework service call android.app.IActivityManager.registerReceiver hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuzdescription ioc process Framework service call android.app.job.IJobScheduler.schedule hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz
Processes
-
hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4265 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/oat/x86/Ygg.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4327
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
758KB
MD5975bac85560f686421490653558fde3f
SHA1a097d7f1f79fde99acafd395b135b7855d0b0921
SHA2568c02c99e3a9a41bfe8d125d47e4aa497870fd530d107aceaf412fbb8742ef460
SHA5125da83a755e2c480d08b18acf6312d52ef94fe88d45c1d4c90793d9830ccadc8ebeb43bd95597161eac663dd9a3502d9ae292eae4670e9ec72e65d17d34b69aa0
-
Filesize
758KB
MD55a85fa2832a4ce13fc9ffd990aa0d9f6
SHA121ca463ff3580b5e63b1a643d3a8b96413f4f0d7
SHA2563415847ddb30e5d07ce06ab1b190e5e962538b96317609685ea264ab5a4db2aa
SHA51285ccf7819520b8dcca580fc1e6daef02d5b623f29c022c4ad6401e6582bf2582d4709a08ba8d8f978393493953cc150b1add0cbdd63403ffe8c7d7450afd69bd
-
Filesize
460B
MD585b51cdf2084fa288847722bd000a7ae
SHA105cde6dfb9c825929ff3cb5c8ed50c1e04117886
SHA256f549044ff09086a18cbadc336d49d2d3a4163c45698f6c3fcb71e107f6fabc86
SHA512c576f6d176f202500cc44c8011e6588d25c83326ab1063e3cb7d84565333e0deba72cea9de491870d1f2797c7c4ad9a2aaa913b9ddb9191f338ae8db619758cc
-
Filesize
758KB
MD59491148409f0cd4b202ac98651099490
SHA1b472d888c2792dfe1b51e132145d8440ecb97151
SHA256c4c6638d96d338aa75712743b6e605e2d73af858db3ca1522d55ccdceebecf98
SHA51292feb604f00dbaf2c69877092ec81a8f664382b31d9cf864c35d8d6bb520798878369d51143876e568d13e70956dcad626aaf77f9a5429bc85a8dff956ba72f3