Analysis

  • max time kernel
    176s
  • max time network
    185s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240514-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system
  • submitted
    17-05-2024 18:21

General

  • Target

    3382348F9618058DDE3AACFFCB34982E.apk

  • Size

    1.5MB

  • MD5

    3382348f9618058dde3aacffcb34982e

  • SHA1

    afd02498459773d4c1d271214446fc7db0a5e49d

  • SHA256

    f57a44bec2f7af2da443f068edb0a743f9625ac3a9d686393bacb8e72274b5de

  • SHA512

    a7efa941966dc180b9d007b0bc05ef3178b0b02a2a971d5a07e070d0d26241ef484af7b3f21d6e0b4e2f01eddc60bc007190e4cf6405fe38f091c869924cb9ba

  • SSDEEP

    24576:i08Vc7uZeiP+7ixzNWi2CCtz8BBQn3WnA0f0lbxDho3OOGkbQkHAIawNh:UVccKiNki2CCqBQnG1ax1oezkvnawNh

Malware Config

Extracted

Family

alienbot

C2

http://scargkanesiki.info/

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus payload 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Prevents application removal 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to prevent removal.

  • Removes its main activity from the application launcher 1 TTPs 10 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • irbqyuyjucec.xkypc.srowoc
    1⤵
    • Makes use of the framework's Accessibility service
    • Prevents application removal
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Schedules tasks to execute at a specified time
    PID:4589

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/JkCIgr.json

    Filesize

    357KB

    MD5

    98e1a67f7441e177f9665bb02c8b6f29

    SHA1

    243041498aefd160f351d1f2c38e5238f8aad148

    SHA256

    f592f92764ebd3f274b6ff68fe6ea2d9efa9ec10cb5c2e5f5033f840b034c40b

    SHA512

    0994ae3ac298cc81d727fe156ee8be38f3f00d6c1bc422bb930f7e5e70ebe8e6499cabadf6dee922a3b935f98fdbcb9c7606b6cea1aa2838a9c25b82adfdae52

  • /data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/JkCIgr.json

    Filesize

    357KB

    MD5

    0f64be9ef8fc13e31decfbf867c0635b

    SHA1

    cb6c3e8378a55ca9f502ba4f74e3e3c2aaee63a0

    SHA256

    ebcdce55f409e5c4ed10144749f5b82bf0d94e4ee715595aa4a267f05b05c301

    SHA512

    1abb8b80eb406fe34e0a609b2b4049a07a4e413cc49c60f754899aa652b072a0d358f6cae2f0ba69b526daaa596fe2aebd432cc05e9b95ab21eba8bc39a23334

  • /data/user/0/irbqyuyjucec.xkypc.srowoc/app_DynamicOptDex/oat/JkCIgr.json.cur.prof

    Filesize

    220B

    MD5

    eaf19d2a59f78599b4b2cfa01f4755a1

    SHA1

    7f33cba8245f77e7c27f845eb3f349587e1c7824

    SHA256

    618220eed1feb52f5214cded32da214afe5d0db9b825c114db2bd05ba2f4d6a3

    SHA512

    007d1f199a7f262545d5068b76b4a7e20baad2489ce5d1fb0c69e6322a8dcee2e05e2c12322ebd87c7d14ffc65e80f0f5b057912014bad19d90751f814c150a6