Analysis
-
max time kernel
179s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
08-07-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.apk
-
Size
2.0MB
-
MD5
985c89437897c42ca4effbdd8eeaa481
-
SHA1
01d130825c90e11cdcbb1c7ade1e6fbed08683e4
-
SHA256
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697
-
SHA512
9fd3198dc47a70c000c884f5c71fb95f0859e4fc8d1096d156c7c32206601405f50281491599109291ff474aa10253c6c0a9fa1a3844a67da5dbb7c466840e6f
-
SSDEEP
49152:G6EF5D4k36a68WhgHLH4HPvd3B2G2Ryuzw0rcJ:GH/4k36yWhY74Ht3B2RRSJ
Malware Config
Extracted
alienbot
http://yawyawvaryyaaaa.com
Extracted
alienbot
http://yawyawvaryyaaaa.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
resource yara_rule behavioral1/memory/4339-0.dex family_cerberus behavioral1/memory/4314-0.dex family_cerberus -
pid Process 4314 com.ladder.race -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.ladder.race -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ladder.race/app_DynamicOptDex/TkJ.json 4339 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ladder.race/app_DynamicOptDex/TkJ.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.ladder.race/app_DynamicOptDex/oat/x86/TkJ.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ladder.race/app_DynamicOptDex/TkJ.json 4314 com.ladder.race -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ladder.race Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ladder.race -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.ladder.race -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ladder.race -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.ladder.race -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ladder.race android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ladder.race -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ladder.race -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.ladder.race -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ladder.race -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.ladder.race -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ladder.race -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ladder.race
Processes
-
com.ladder.race1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4314 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ladder.race/app_DynamicOptDex/TkJ.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.ladder.race/app_DynamicOptDex/oat/x86/TkJ.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4339
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD50c20aeae7ecea383e919b545fa02b3ab
SHA1e3c1f46468da3d06b4ca6b5d7854a8f70502c5a6
SHA256db6cdb685489e747a236690f65f043b6bf49a8ae9d1f7502656259f55827b1fa
SHA5128cb29c29c62705862cc41b2dad8f9a9e4ec63d95ac33c9249f88c4313422618cfaac8e8358928bea752a41ac00bf8f8e4dda939aa3fac1171aae90f6446eaf06
-
Filesize
238KB
MD5fb30c6cb0eb2cc647ad1754217c5becc
SHA16d156a80d2ba061f8505a38c09178a8e3fad20db
SHA2566fb80809c1e2887bf89bbe1c637537dd8c77902a412a61cf2a9801824d38c196
SHA5122df158f9d2c4e83cb155274df46f667fe0a05791ad9f2d9fb1ab165eb5ac8cf49da2a871a795f4f902d7830329e21233b1efa8c70061a1b2a05b4ba8e81d59c2
-
Filesize
446B
MD51fd7af62fcd2571ef985b31d989832cb
SHA1b737489928a37da10e4f3d54d64075e2a494a350
SHA2560542467644d76c4f1a9df708c552d48c4feb1a01cfa0212566da9e0ea41666ac
SHA5121fd28930f34c9b3481627028cca1faa5d7670958cc3793deb98f246dbc8d6a6d7452701f2a9e5ad2f9d6d688503d16cda19f66341382bfd14b4601c3f01dc574
-
Filesize
483KB
MD5fee89f2792bd517d5d19595d8f9256af
SHA19e4c1d95fb0bc3c3c3d3cb7aac7bf74af1bd0397
SHA256418646b1984f726351f980cd616004334ce6fcbdb311d037f61b9e9bff45ee3a
SHA512d5b7d2140769a54194dbb74ac1c8b20b91656d44c45b58343cf9ab28a53a74d48437a05f134b48c3a68cc8d4f3b94d1b101817a42161d70bbd40346097cc7e48
-
Filesize
483KB
MD5443f61b23b147209b42cdfb128a07d80
SHA177a718d6ef5ff45c9d0af256ae59f26baf58026b
SHA25653b9896c2511876373cb866c2ad494206cad3b848131598692b8828497591fc9
SHA512c5bfc393f973ddea4f0cbf3f56f1fb41e91a642e745d89376fab7e6ce0d9e8b5fd303585ac584024627a8a2aa84aefb6b6f0ca00532d01c18ba3c446ae703f38