Analysis
-
max time kernel
278s -
max time network
282s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
25-07-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
87cff4f61b32306eaec1f50af02d0521937aadd6f1c1a3b3d5ea177ebe690f47.apk
Resource
android-x86-arm-20240624-en
General
-
Target
87cff4f61b32306eaec1f50af02d0521937aadd6f1c1a3b3d5ea177ebe690f47.apk
-
Size
1.9MB
-
MD5
8b219d57fafcdb3b2e0d053d344c98c8
-
SHA1
566bdae1390d8e9c910064c9f4a3812f3abc9a67
-
SHA256
87cff4f61b32306eaec1f50af02d0521937aadd6f1c1a3b3d5ea177ebe690f47
-
SHA512
53d4fb2e8b2e2269968e93cf3d5d18e3a8d3ce82f44a9f9324ad84c7103e36746099a2ca7f6d656d11e75e9253cd9fb37053afcea6c144d727353a0da208f690
-
SSDEEP
49152:ndCaJyQk1wecel5BxDIk4fQ5QFFTF+pqeBRobd0C1HybrbD:njJytcYlnqZRyENI
Malware Config
Extracted
alienbot
http://ricktreemonkey54st.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload 2 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_cerberus behavioral1/memory/4241-1.dex family_cerberus -
pid Process 4241 valve.general.hour -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model valve.general.hour -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/valve.general.hour/app_DynamicOptDex/cTicF.json 4241 valve.general.hour /data/user/0/valve.general.hour/app_DynamicOptDex/cTicF.json 4274 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/valve.general.hour/app_DynamicOptDex/cTicF.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/valve.general.hour/app_DynamicOptDex/oat/x86/cTicF.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/valve.general.hour/app_DynamicOptDex/cTicF.json 4241 valve.general.hour -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId valve.general.hour Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId valve.general.hour -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser valve.general.hour -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 10 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction valve.general.hour -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone valve.general.hour -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT valve.general.hour -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS valve.general.hour -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS valve.general.hour -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver valve.general.hour -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule valve.general.hour -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo valve.general.hour -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo valve.general.hour
Processes
-
valve.general.hour1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4241 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/valve.general.hour/app_DynamicOptDex/cTicF.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/valve.general.hour/app_DynamicOptDex/oat/x86/cTicF.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4274
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735KB
MD5ac2fff9e7638b9cf91dce98e13d91709
SHA1820ce6370aa4b440743100910312f82f756fa2b3
SHA256983d54b64dc5b2db827ca7f7514fd6f21d5ef6a412f2d159ab561c1db8b7f5c8
SHA51244230e6d19d536cb0b8489ea80cf4f5f737df33140aba8ead61c114186910f094071d9a22b9459827bbad41809dec1143c5423ce4ecf5a4e50252220caa45e09
-
Filesize
735KB
MD5ff8d98b46eb2f78ca3eb9a563def2c5a
SHA1a5d2cb0a76995aaecf3db94f59c1d19434d2eda4
SHA2567b27de007e67d4627b268740a8c683325dc426b66074119a9d1339ce5f278f07
SHA512d065a61b7456eecbcbd81b05245e8f8398bcfa9c0946e388887f745b5ff4fc94da36ed1f38ac5250444d59ee3f3c46a8f7014c161e6c640b13d07aa24a8d1031
-
Filesize
530B
MD50048128e9544381fd71f133012a0e5c0
SHA10ad23c9933c19e5ffb5e20402ed71332ccbaa8ad
SHA2566e00195b67692dfc9c0f7266d11adadbb6e7a4d656d5be7d63f7f22a97a5d2b6
SHA5121934167ceeea0513274da93ceddc85ad4d0ac9ca525137dcc03e9cb1d66b2c9ca2e032ec79d0b4c95b642f093458327d66008f1b81162aca3fee969a0d11cdcf
-
Filesize
735KB
MD57b385c6c423d7acc90510ee294d24628
SHA1313ed236e6963c1e0d1936634bce042f36999d40
SHA2568f11951730d8f31d346b8c82abc9b8717254b5d1da519788f4711a2c14623043
SHA5125c8cd0a351d0192a87ff636fbd8db56865562a0cafbd764288fb8eaf7d89f7fdf522d27059a32264a5fc246d79021a65f79ea9051e9bb3941adaae55bce78576