Analysis
-
max time kernel
177s -
max time network
138s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
18-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.apk
Resource
android-x64-20240624-en
General
-
Target
793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.apk
-
Size
3.1MB
-
MD5
65e4932b64e9371109d5c59d6d7ba457
-
SHA1
21766759eea069df8211d15ef4eaa618419e87b7
-
SHA256
793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da
-
SHA512
fe91b56ad629f8ebdea5d126b53a8c959aa4d7283c8ab3d7b97adf9d9cf1801c8a36d4bda7009aed550b99cbba3429b5fb52ecb1f92d96ac1160504ab4bcc700
-
SSDEEP
98304:x+n2Ijfsx9IwSvVuHbDh3/C/u9BlCgfw39x:+2I2GwSv2hzgp3
Malware Config
Extracted
alienbot
http://kvq9t8pe7ssjps8p4iqj.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
pid Process 4257 net.veteran.coordinate 4257 net.veteran.coordinate 4257 net.veteran.coordinate 4257 net.veteran.coordinate 4257 net.veteran.coordinate 4257 net.veteran.coordinate 4257 net.veteran.coordinate 4257 net.veteran.coordinate 4257 net.veteran.coordinate -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json 4284 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/net.veteran.coordinate/app_DynamicOptDex/oat/x86/CEVSifuApuSVgkCO.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json 4257 net.veteran.coordinate -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId net.veteran.coordinate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText net.veteran.coordinate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId net.veteran.coordinate -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser net.veteran.coordinate -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock net.veteran.coordinate -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground net.veteran.coordinate -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS net.veteran.coordinate -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver net.veteran.coordinate -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule net.veteran.coordinate
Processes
-
net.veteran.coordinate1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4257 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/net.veteran.coordinate/app_DynamicOptDex/oat/x86/CEVSifuApuSVgkCO.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4284
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD55bfa7b57e0894aa8317a74e42421a741
SHA1d1f0f912e26fc4c55c10732212fe14d1f70fe7ad
SHA2568e0402daa70ffdf2fe68474ebb46efe4e887f753cec654da6e8f0239dfc4bf72
SHA51222abdcec318ba9bace1ca96e9d50baf2bb7bf7c34efd59d21fcd544a6dff4474656916b3abb41718499bc3d07da2691c6ca267a03610c475b0cdc1fe47ec4378
-
Filesize
697KB
MD5e69b766ccc6786111fa1776480dbea9a
SHA1b0fcc411c3e8a546aa4a7486417ffbb70315f589
SHA25630a67d7c7133b5e8bddc0c04fc97540489e3e3a048f9c09c76532113680b6f2f
SHA512db783ec398b9fb8a9adb03b77395e985916b2a185d6cfaa56e45843be48b0f2ff1f03228a0c5bbbadfefd5ca88b2ab917f8b836bae99623bdd91d2b136fe5f64
-
Filesize
1KB
MD5ce1ec815c029425512b68c155aa5dc67
SHA19bf296b701855c1992b71286815bb65c0a6b456b
SHA256935ab67f254faad2a86b48b8d75cfc102ff9634e0b74b8c7c96d40ef5535e935
SHA512c379266fb408e6cb1c8f43017b8a31b45cb550de91413df7c882e936371bb855190a3b9705eb0f21bbb80a6953734b95cb621145597d2ba5b1b66238d8864641
-
Filesize
902KB
MD58b9e313a996cf29d1f04235cf91c458f
SHA1bc5070256ff0dab5c003e90e2d3cda0a17202fc9
SHA256ec5e2a7bd748c27c47a753c1c991926e79cf8f4f6d6e513911056f12ce7cbdc6
SHA5129f463a028220e5da0a56787c00a046c917c53fb2e70bfac5f1be63c5975035832cdc89f239c984cee49f65c7155d515a1f7cd0c51cab9020a7c283c111cf52c0
-
Filesize
902KB
MD5ebb4bc2531d22f6984634a24b535b69e
SHA19252c617b8f221a3ea4d197c87e9497be236cb64
SHA2567ae6794adbb3d2661510039084cc187a5247780f6d0cf555393fa9b50d6af0f7
SHA51252dc75e07c569b65d59577d552a41c476b5846e10a4764624bfeb9e5ce22f276b1ea313987c17ac93bc8aba2cc47a4c6001ba113deec966d9c41143752aa5c19