Analysis

  • max time kernel
    177s
  • max time network
    138s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    18-08-2024 22:03

General

  • Target

    793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.apk

  • Size

    3.1MB

  • MD5

    65e4932b64e9371109d5c59d6d7ba457

  • SHA1

    21766759eea069df8211d15ef4eaa618419e87b7

  • SHA256

    793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da

  • SHA512

    fe91b56ad629f8ebdea5d126b53a8c959aa4d7283c8ab3d7b97adf9d9cf1801c8a36d4bda7009aed550b99cbba3429b5fb52ecb1f92d96ac1160504ab4bcc700

  • SSDEEP

    98304:x+n2Ijfsx9IwSvVuHbDh3/C/u9BlCgfw39x:+2I2GwSv2hzgp3

Malware Config

Extracted

Family

alienbot

C2

http://kvq9t8pe7ssjps8p4iqj.xyz

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Removes its main activity from the application launcher 1 TTPs 9 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • net.veteran.coordinate
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries account information for other applications stored on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    PID:4257
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/net.veteran.coordinate/app_DynamicOptDex/oat/x86/CEVSifuApuSVgkCO.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4284

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json

    Filesize

    697KB

    MD5

    5bfa7b57e0894aa8317a74e42421a741

    SHA1

    d1f0f912e26fc4c55c10732212fe14d1f70fe7ad

    SHA256

    8e0402daa70ffdf2fe68474ebb46efe4e887f753cec654da6e8f0239dfc4bf72

    SHA512

    22abdcec318ba9bace1ca96e9d50baf2bb7bf7c34efd59d21fcd544a6dff4474656916b3abb41718499bc3d07da2691c6ca267a03610c475b0cdc1fe47ec4378

  • /data/data/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json

    Filesize

    697KB

    MD5

    e69b766ccc6786111fa1776480dbea9a

    SHA1

    b0fcc411c3e8a546aa4a7486417ffbb70315f589

    SHA256

    30a67d7c7133b5e8bddc0c04fc97540489e3e3a048f9c09c76532113680b6f2f

    SHA512

    db783ec398b9fb8a9adb03b77395e985916b2a185d6cfaa56e45843be48b0f2ff1f03228a0c5bbbadfefd5ca88b2ab917f8b836bae99623bdd91d2b136fe5f64

  • /data/data/net.veteran.coordinate/app_DynamicOptDex/oat/CEVSifuApuSVgkCO.json.cur.prof

    Filesize

    1KB

    MD5

    ce1ec815c029425512b68c155aa5dc67

    SHA1

    9bf296b701855c1992b71286815bb65c0a6b456b

    SHA256

    935ab67f254faad2a86b48b8d75cfc102ff9634e0b74b8c7c96d40ef5535e935

    SHA512

    c379266fb408e6cb1c8f43017b8a31b45cb550de91413df7c882e936371bb855190a3b9705eb0f21bbb80a6953734b95cb621145597d2ba5b1b66238d8864641

  • /data/user/0/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json

    Filesize

    902KB

    MD5

    8b9e313a996cf29d1f04235cf91c458f

    SHA1

    bc5070256ff0dab5c003e90e2d3cda0a17202fc9

    SHA256

    ec5e2a7bd748c27c47a753c1c991926e79cf8f4f6d6e513911056f12ce7cbdc6

    SHA512

    9f463a028220e5da0a56787c00a046c917c53fb2e70bfac5f1be63c5975035832cdc89f239c984cee49f65c7155d515a1f7cd0c51cab9020a7c283c111cf52c0

  • /data/user/0/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json

    Filesize

    902KB

    MD5

    ebb4bc2531d22f6984634a24b535b69e

    SHA1

    9252c617b8f221a3ea4d197c87e9497be236cb64

    SHA256

    7ae6794adbb3d2661510039084cc187a5247780f6d0cf555393fa9b50d6af0f7

    SHA512

    52dc75e07c569b65d59577d552a41c476b5846e10a4764624bfeb9e5ce22f276b1ea313987c17ac93bc8aba2cc47a4c6001ba113deec966d9c41143752aa5c19