Analysis
-
max time kernel
179s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
24-08-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
0e1b38ce12e756a2a57c886233f6d25734b20115ea8f2d179d48560c311a2a2c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0e1b38ce12e756a2a57c886233f6d25734b20115ea8f2d179d48560c311a2a2c.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
0e1b38ce12e756a2a57c886233f6d25734b20115ea8f2d179d48560c311a2a2c.apk
-
Size
4.0MB
-
MD5
f8c34812ed3025d042ed634ae40b7ba8
-
SHA1
c760498b03cd0c90ce5152b0e6b9aae7933f3449
-
SHA256
0e1b38ce12e756a2a57c886233f6d25734b20115ea8f2d179d48560c311a2a2c
-
SHA512
2570ea2c629b65e0b0a0d0d4ea32dced94d17a145c3366d99c37f4d52e2b048671712d2e6364b7a84e02ae029978c83226229b4fa6bbcae38c6da0ee5e46bc10
-
SSDEEP
98304:d4j9eQD/FouBzkEtlnLMgiuKrUD/c/s93c1gNFTUgIB0rKk+ayk:CPCi5nrvw+a1g3sBBT9k
Malware Config
Extracted
alienbot
http://kvq9t8pe7ssjps8p4iqj.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
pid Process 4270 fr.president.decorate 4270 fr.president.decorate 4270 fr.president.decorate 4270 fr.president.decorate 4270 fr.president.decorate 4270 fr.president.decorate 4270 fr.president.decorate 4270 fr.president.decorate 4270 fr.president.decorate -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/fr.president.decorate/app_DynamicOptDex/HnSY.json 4297 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/fr.president.decorate/app_DynamicOptDex/HnSY.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/fr.president.decorate/app_DynamicOptDex/oat/x86/HnSY.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/fr.president.decorate/app_DynamicOptDex/HnSY.json 4270 fr.president.decorate -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId fr.president.decorate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText fr.president.decorate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId fr.president.decorate -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser fr.president.decorate -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock fr.president.decorate -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground fr.president.decorate -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.president.decorate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.president.decorate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.president.decorate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.president.decorate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.president.decorate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.president.decorate -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone fr.president.decorate -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS fr.president.decorate -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver fr.president.decorate -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule fr.president.decorate -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo fr.president.decorate -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo fr.president.decorate
Processes
-
fr.president.decorate1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4270 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/fr.president.decorate/app_DynamicOptDex/HnSY.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/fr.president.decorate/app_DynamicOptDex/oat/x86/HnSY.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4297
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD509dd8525785164f3dde78e14d71fdf16
SHA126aff499cbeda6d123d88245b8e7ba5f114cc4fe
SHA256d28af1414e02daff100b7eeb1ab49d0bcf11e805116343fc83788983f400bb26
SHA5121f034128e9c0147806283d3eb93704962f43de4f62d07ff9c2e82f1745b2813a33752cacf29cb706bf93f4705a672d9f74cd85995638aaed4de6cfb136bbe4e2
-
Filesize
697KB
MD569ae38ce6183e938e5c5bb0963f10b11
SHA196b7885ee503a3e943847abadb871234b6dfcfc9
SHA25642c4286d0c030339b28073fe22ad804d6daa12df02b04a06c057ffc97778acc8
SHA512e2b05f4fa48dc27412f9d462d220b8aa2e9404e60adba1548c7692874f6d4cf931307aff5441f097f541d5aaa7572af9a115f79afd6fa3b85e76f9cf98d24b3f
-
Filesize
1KB
MD513c5c7c1530606a9d6d2d445d56e75cb
SHA1847b726f71d1c061a9711aacf8a2c8648a2dd693
SHA256ab4ca60d015bcd77c93e51b98a072e56e2a1fd0633a4f17f56b8477b88c55f36
SHA512c662e34097d47cd20d81919e255aeb9bccbc5725dca35cca1f04dab0f5c3bf8a47a56b2ddf4098ea44c10680ead3e1ca402c34be2d3347867290a02a6894a11d
-
Filesize
902KB
MD537158d4c3f31da85018ba3c84802c36b
SHA183cadbd7b3d6f083d6213d91de5d3d5e9851a0be
SHA25653f0fa0a282cbe6a0fdca2df05cf0c0d499aec26f3e73fbc7c77d7dc9045a1d5
SHA5129b8fba1bad96cfab46f13c48ad90ae6e19606d3efb5e25ad80970f6b08e7ae4aa4da666b82c276d423ee9964de787c6f7dcf0f31f319cdc1a314ae3bc981c0d7
-
Filesize
902KB
MD52a9cd827e7ea4a17bbd9091d84e300a5
SHA19a78d771171685b1d383ff8b83c06e3011f8f3eb
SHA256f408d7e16fb27f0d09af912d538025b489c29fb59e88beee81cf65f250176a13
SHA5125e81d698f3d0f6b3a44d9d12dce145c53705187d556a6b625786ef88c1401a12aa8ed0e5e0e228633d1f485a75d8ec3135bcb8b2f837b7602d18770690686496