Analysis
-
max time kernel
178s -
max time network
147s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
18-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.apk
Resource
android-x64-20240624-en
General
-
Target
793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.apk
-
Size
3.1MB
-
MD5
65e4932b64e9371109d5c59d6d7ba457
-
SHA1
21766759eea069df8211d15ef4eaa618419e87b7
-
SHA256
793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da
-
SHA512
fe91b56ad629f8ebdea5d126b53a8c959aa4d7283c8ab3d7b97adf9d9cf1801c8a36d4bda7009aed550b99cbba3429b5fb52ecb1f92d96ac1160504ab4bcc700
-
SSDEEP
98304:x+n2Ijfsx9IwSvVuHbDh3/C/u9BlCgfw39x:+2I2GwSv2hzgp3
Malware Config
Extracted
alienbot
http://kvq9t8pe7ssjps8p4iqj.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
pid Process 4963 net.veteran.coordinate 4963 net.veteran.coordinate 4963 net.veteran.coordinate 4963 net.veteran.coordinate 4963 net.veteran.coordinate 4963 net.veteran.coordinate 4963 net.veteran.coordinate 4963 net.veteran.coordinate -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/net.veteran.coordinate/app_DynamicOptDex/CEVSifuApuSVgkCO.json 4963 net.veteran.coordinate -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId net.veteran.coordinate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId net.veteran.coordinate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText net.veteran.coordinate -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener net.veteran.coordinate -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser net.veteran.coordinate -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock net.veteran.coordinate -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground net.veteran.coordinate -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction net.veteran.coordinate -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone net.veteran.coordinate -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver net.veteran.coordinate -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule net.veteran.coordinate -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo net.veteran.coordinate -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo net.veteran.coordinate
Processes
-
net.veteran.coordinate1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4963
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD55bfa7b57e0894aa8317a74e42421a741
SHA1d1f0f912e26fc4c55c10732212fe14d1f70fe7ad
SHA2568e0402daa70ffdf2fe68474ebb46efe4e887f753cec654da6e8f0239dfc4bf72
SHA51222abdcec318ba9bace1ca96e9d50baf2bb7bf7c34efd59d21fcd544a6dff4474656916b3abb41718499bc3d07da2691c6ca267a03610c475b0cdc1fe47ec4378
-
Filesize
697KB
MD5e69b766ccc6786111fa1776480dbea9a
SHA1b0fcc411c3e8a546aa4a7486417ffbb70315f589
SHA25630a67d7c7133b5e8bddc0c04fc97540489e3e3a048f9c09c76532113680b6f2f
SHA512db783ec398b9fb8a9adb03b77395e985916b2a185d6cfaa56e45843be48b0f2ff1f03228a0c5bbbadfefd5ca88b2ab917f8b836bae99623bdd91d2b136fe5f64
-
Filesize
350B
MD57a3dee0fabf815133a03d17fb70a98fc
SHA12911e1aad721ef610eeac1e1339b7161c4302527
SHA256c7beb64512cb3fba70291ea5b7ae795409019fd9dd2b218418173241140638b4
SHA512b23175aa5447812ccc0a493f3ceacafaebec69911e6f636218b4c1ed8f73370791071de11c3087b06695f1a81df0256f5557e2440350f9de69cd5342e835e1d6
-
Filesize
902KB
MD5ebb4bc2531d22f6984634a24b535b69e
SHA19252c617b8f221a3ea4d197c87e9497be236cb64
SHA2567ae6794adbb3d2661510039084cc187a5247780f6d0cf555393fa9b50d6af0f7
SHA51252dc75e07c569b65d59577d552a41c476b5846e10a4764624bfeb9e5ce22f276b1ea313987c17ac93bc8aba2cc47a4c6001ba113deec966d9c41143752aa5c19