Analysis

  • max time kernel
    179s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    17-05-2024 18:20

General

  • Target

    2e73cd5a5324c97285fd48800c51bed1.apk

  • Size

    1.5MB

  • MD5

    2e73cd5a5324c97285fd48800c51bed1

  • SHA1

    f8c36b4aaffa874beba36a30df40cc57795a61ca

  • SHA256

    48d3387a87d0553bf792cac36a138b6f6a44c1ae02afb425fc5eb814be78f14f

  • SHA512

    a74e907ac37d3b06f1779ac13b7c7494fb60e893f2d9ac0a985bbc1637fb12dcf3ab08f1d2cf4aa374c12f963362ee6750e03590c2bc64db7d29995a7789b9c6

  • SSDEEP

    24576:w2gRFNemMOZC4AxRq7TlCw4n5lKgMrtTCdxyDhw5VrWOMHHi3btRJPz4k3XqEcyI:rgFhNC7q714boT+x8hw5VbX3bX6knqII

Malware Config

Extracted

Family

alienbot

C2

http://kitapkilidi.online

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus payload 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Prevents application removal 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to prevent removal.

  • Removes its main activity from the application launcher 1 TTPs 7 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz
    1⤵
    • Makes use of the framework's Accessibility service
    • Prevents application removal
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Schedules tasks to execute at a specified time
    PID:4621

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json

    Filesize

    758KB

    MD5

    975bac85560f686421490653558fde3f

    SHA1

    a097d7f1f79fde99acafd395b135b7855d0b0921

    SHA256

    8c02c99e3a9a41bfe8d125d47e4aa497870fd530d107aceaf412fbb8742ef460

    SHA512

    5da83a755e2c480d08b18acf6312d52ef94fe88d45c1d4c90793d9830ccadc8ebeb43bd95597161eac663dd9a3502d9ae292eae4670e9ec72e65d17d34b69aa0

  • /data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/Ygg.json

    Filesize

    758KB

    MD5

    5a85fa2832a4ce13fc9ffd990aa0d9f6

    SHA1

    21ca463ff3580b5e63b1a643d3a8b96413f4f0d7

    SHA256

    3415847ddb30e5d07ce06ab1b190e5e962538b96317609685ea264ab5a4db2aa

    SHA512

    85ccf7819520b8dcca580fc1e6daef02d5b623f29c022c4ad6401e6582bf2582d4709a08ba8d8f978393493953cc150b1add0cbdd63403ffe8c7d7450afd69bd

  • /data/user/0/hzjjlkwxjafw.yhxmdqssbnnihufecoibtzx.assuz/app_DynamicOptDex/oat/Ygg.json.cur.prof

    Filesize

    334B

    MD5

    93c526fe7b1afa6cf6142324e9909cb9

    SHA1

    b52f4ab6810b593b352436f1b8d557c3f51c8489

    SHA256

    dfd39d34485e1a72e17c3e560dccb99e749fd2cdd5765a267e2d3cfe9acf7aa2

    SHA512

    5cc91c884390876f81dbc698a983862e8e27fb772a84b57abcfb313d7be2532864bfc39d388683c5dd5d3397901cc71b7c31a967f889a82a9660e613119f8787