Analysis

  • max time kernel
    178s
  • max time network
    147s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    18-08-2024 22:03

General

  • Target

    793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.apk

  • Size

    3.1MB

  • MD5

    65e4932b64e9371109d5c59d6d7ba457

  • SHA1

    21766759eea069df8211d15ef4eaa618419e87b7

  • SHA256

    793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da

  • SHA512

    fe91b56ad629f8ebdea5d126b53a8c959aa4d7283c8ab3d7b97adf9d9cf1801c8a36d4bda7009aed550b99cbba3429b5fb52ecb1f92d96ac1160504ab4bcc700

  • SSDEEP

    98304:x+n2Ijfsx9IwSvVuHbDh3/C/u9BlCgfw39x:+2I2GwSv2hzgp3

Malware Config

Extracted

Family

alienbot

C2

http://kvq9t8pe7ssjps8p4iqj.xyz

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Removes its main activity from the application launcher 1 TTPs 8 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • net.veteran.coordinate
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries account information for other applications stored on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Checks CPU information
    • Checks memory information
    PID:4963

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json

    Filesize

    697KB

    MD5

    5bfa7b57e0894aa8317a74e42421a741

    SHA1

    d1f0f912e26fc4c55c10732212fe14d1f70fe7ad

    SHA256

    8e0402daa70ffdf2fe68474ebb46efe4e887f753cec654da6e8f0239dfc4bf72

    SHA512

    22abdcec318ba9bace1ca96e9d50baf2bb7bf7c34efd59d21fcd544a6dff4474656916b3abb41718499bc3d07da2691c6ca267a03610c475b0cdc1fe47ec4378

  • /data/data/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json

    Filesize

    697KB

    MD5

    e69b766ccc6786111fa1776480dbea9a

    SHA1

    b0fcc411c3e8a546aa4a7486417ffbb70315f589

    SHA256

    30a67d7c7133b5e8bddc0c04fc97540489e3e3a048f9c09c76532113680b6f2f

    SHA512

    db783ec398b9fb8a9adb03b77395e985916b2a185d6cfaa56e45843be48b0f2ff1f03228a0c5bbbadfefd5ca88b2ab917f8b836bae99623bdd91d2b136fe5f64

  • /data/data/net.veteran.coordinate/app_DynamicOptDex/oat/CEVSifuApuSVgkCO.json.cur.prof

    Filesize

    350B

    MD5

    7a3dee0fabf815133a03d17fb70a98fc

    SHA1

    2911e1aad721ef610eeac1e1339b7161c4302527

    SHA256

    c7beb64512cb3fba70291ea5b7ae795409019fd9dd2b218418173241140638b4

    SHA512

    b23175aa5447812ccc0a493f3ceacafaebec69911e6f636218b4c1ed8f73370791071de11c3087b06695f1a81df0256f5557e2440350f9de69cd5342e835e1d6

  • /data/user/0/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json

    Filesize

    902KB

    MD5

    ebb4bc2531d22f6984634a24b535b69e

    SHA1

    9252c617b8f221a3ea4d197c87e9497be236cb64

    SHA256

    7ae6794adbb3d2661510039084cc187a5247780f6d0cf555393fa9b50d6af0f7

    SHA512

    52dc75e07c569b65d59577d552a41c476b5846e10a4764624bfeb9e5ce22f276b1ea313987c17ac93bc8aba2cc47a4c6001ba113deec966d9c41143752aa5c19