Analysis
-
max time kernel
177s -
max time network
184s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
17-05-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
3382348F9618058DDE3AACFFCB34982E.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
3382348F9618058DDE3AACFFCB34982E.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
3382348F9618058DDE3AACFFCB34982E.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
3382348F9618058DDE3AACFFCB34982E.apk
-
Size
1.5MB
-
MD5
3382348f9618058dde3aacffcb34982e
-
SHA1
afd02498459773d4c1d271214446fc7db0a5e49d
-
SHA256
f57a44bec2f7af2da443f068edb0a743f9625ac3a9d686393bacb8e72274b5de
-
SHA512
a7efa941966dc180b9d007b0bc05ef3178b0b02a2a971d5a07e070d0d26241ef484af7b3f21d6e0b4e2f01eddc60bc007190e4cf6405fe38f091c869924cb9ba
-
SSDEEP
24576:i08Vc7uZeiP+7ixzNWi2CCtz8BBQn3WnA0f0lbxDho3OOGkbQkHAIawNh:UVccKiNki2CCqBQnG1ax1oezkvnawNh
Malware Config
Extracted
alienbot
http://scargkanesiki.info/
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/fstream-2.dat family_cerberus behavioral1/memory/4291-1.dex family_cerberus -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
irbqyuyjucec.xkypc.srowocdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId irbqyuyjucec.xkypc.srowoc Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId irbqyuyjucec.xkypc.srowoc -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
irbqyuyjucec.xkypc.srowocdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction irbqyuyjucec.xkypc.srowoc -
Processes:
irbqyuyjucec.xkypc.srowocpid Process 4291 irbqyuyjucec.xkypc.srowoc -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
irbqyuyjucec.xkypc.srowoc/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/JkCIgr.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/oat/x86/JkCIgr.odex --compiler-filter=quicken --class-loader-context=&ioc pid Process /data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/JkCIgr.json 4291 irbqyuyjucec.xkypc.srowoc /data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/JkCIgr.json 4320 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/JkCIgr.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/oat/x86/JkCIgr.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/JkCIgr.json 4291 irbqyuyjucec.xkypc.srowoc -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
irbqyuyjucec.xkypc.srowocdescription ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser irbqyuyjucec.xkypc.srowoc -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
irbqyuyjucec.xkypc.srowocdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver irbqyuyjucec.xkypc.srowoc -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
irbqyuyjucec.xkypc.srowocdescription ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS irbqyuyjucec.xkypc.srowoc -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
irbqyuyjucec.xkypc.srowocdescription ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS irbqyuyjucec.xkypc.srowoc -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
irbqyuyjucec.xkypc.srowocdescription ioc Process Framework service call android.app.job.IJobScheduler.schedule irbqyuyjucec.xkypc.srowoc
Processes
-
irbqyuyjucec.xkypc.srowoc1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Requests enabling of the accessibility settings.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4291 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/JkCIgr.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/oat/x86/JkCIgr.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4320
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD598e1a67f7441e177f9665bb02c8b6f29
SHA1243041498aefd160f351d1f2c38e5238f8aad148
SHA256f592f92764ebd3f274b6ff68fe6ea2d9efa9ec10cb5c2e5f5033f840b034c40b
SHA5120994ae3ac298cc81d727fe156ee8be38f3f00d6c1bc422bb930f7e5e70ebe8e6499cabadf6dee922a3b935f98fdbcb9c7606b6cea1aa2838a9c25b82adfdae52
-
Filesize
357KB
MD50f64be9ef8fc13e31decfbf867c0635b
SHA1cb6c3e8378a55ca9f502ba4f74e3e3c2aaee63a0
SHA256ebcdce55f409e5c4ed10144749f5b82bf0d94e4ee715595aa4a267f05b05c301
SHA5121abb8b80eb406fe34e0a609b2b4049a07a4e413cc49c60f754899aa652b072a0d358f6cae2f0ba69b526daaa596fe2aebd432cc05e9b95ab21eba8bc39a23334
-
Filesize
354B
MD55d87504e1b34fa9524034e97bcc37987
SHA1ef23883507e888332171cbc1b64cb09e2d95638c
SHA2565ff3c9f64509fdd35511d61c5180d50688ffc0fb85123ff5301de25d28f6bfd0
SHA512acd82892adce1ad30f2d66b155be5973e7793084cbfea24dffe67cbe0a90c93af7b9c322ae0365837322858c5d1b4c4becbead5189b39b211ea50789c41bc26d
-
Filesize
357KB
MD5e70e5985b53622dc008989f77da87f23
SHA1d76a48cfe7e90d62f966418c00d6922ad76811ef
SHA256eb1594c7dc74a2ef50969b9afaa9fbb63f598ed61bbdb798d1e2f456faf2cabf
SHA512d6b0a808fbc82bbb2b1024ae43406106f49a10004fa86cf53e729e71cd849f8776816900d6fac293ac970cc4419b269540dda1b89e142b97b75bf69f7d99ba7c