Analysis
-
max time kernel
177s -
max time network
151s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
08-07-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.apk
-
Size
2.0MB
-
MD5
985c89437897c42ca4effbdd8eeaa481
-
SHA1
01d130825c90e11cdcbb1c7ade1e6fbed08683e4
-
SHA256
d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697
-
SHA512
9fd3198dc47a70c000c884f5c71fb95f0859e4fc8d1096d156c7c32206601405f50281491599109291ff474aa10253c6c0a9fa1a3844a67da5dbb7c466840e6f
-
SSDEEP
49152:G6EF5D4k36a68WhgHLH4HPvd3B2G2Ryuzw0rcJ:GH/4k36yWhY74Ht3B2RRSJ
Malware Config
Extracted
alienbot
http://yawyawvaryyaaaa.com
Extracted
alienbot
http://yawyawvaryyaaaa.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 1 IoCs
resource yara_rule behavioral2/memory/4958-0.dex family_cerberus -
pid Process 4958 com.ladder.race 4958 com.ladder.race 4958 com.ladder.race 4958 com.ladder.race 4958 com.ladder.race 4958 com.ladder.race 4958 com.ladder.race 4958 com.ladder.race 4958 com.ladder.race 4958 com.ladder.race -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ladder.race/app_DynamicOptDex/TkJ.json 4958 com.ladder.race -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ladder.race Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ladder.race -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.ladder.race -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ladder.race -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.ladder.race -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ladder.race android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ladder.race -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ladder.race -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.ladder.race
Processes
-
com.ladder.race1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4958
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD50c20aeae7ecea383e919b545fa02b3ab
SHA1e3c1f46468da3d06b4ca6b5d7854a8f70502c5a6
SHA256db6cdb685489e747a236690f65f043b6bf49a8ae9d1f7502656259f55827b1fa
SHA5128cb29c29c62705862cc41b2dad8f9a9e4ec63d95ac33c9249f88c4313422618cfaac8e8358928bea752a41ac00bf8f8e4dda939aa3fac1171aae90f6446eaf06
-
Filesize
238KB
MD5fb30c6cb0eb2cc647ad1754217c5becc
SHA16d156a80d2ba061f8505a38c09178a8e3fad20db
SHA2566fb80809c1e2887bf89bbe1c637537dd8c77902a412a61cf2a9801824d38c196
SHA5122df158f9d2c4e83cb155274df46f667fe0a05791ad9f2d9fb1ab165eb5ac8cf49da2a871a795f4f902d7830329e21233b1efa8c70061a1b2a05b4ba8e81d59c2
-
Filesize
448B
MD51e8b3de04e067741ebb81f3e4d288cff
SHA13a8217225722d22a1ee1014d90df8bf65897f98d
SHA256d569f6a45317bd2340e47e631a5254f8e6264f8f06072af028228b034372879e
SHA512ffff2884253a546242d3ef9025f8e11eafff30a5f5c56f7dbe8b9702ecf84461f36a0a0c4a228cee98f442eaa0afa3eb630027ebcd8eea21922f16e2356c6c83
-
Filesize
483KB
MD5443f61b23b147209b42cdfb128a07d80
SHA177a718d6ef5ff45c9d0af256ae59f26baf58026b
SHA25653b9896c2511876373cb866c2ad494206cad3b848131598692b8828497591fc9
SHA512c5bfc393f973ddea4f0cbf3f56f1fb41e91a642e745d89376fab7e6ce0d9e8b5fd303585ac584024627a8a2aa84aefb6b6f0ca00532d01c18ba3c446ae703f38