Analysis
-
max time kernel
148s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
08-09-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3.apk
Resource
android-x64-20240910-en
General
-
Target
c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3.apk
-
Size
4.4MB
-
MD5
551fb95cfe9ddf46002815def4cf3fc0
-
SHA1
0990ef0cd4c4afe272b01c57a99fe4247c2de1e5
-
SHA256
c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3
-
SHA512
2e33b61f7633dfb94e9e57da7bfff84f79bad7e1204275c7f421a819beff44775d8c6ee3ef73e7879a1d3bb585b67a64a81ffeaf1c93be43afc3eab4e7b7799e
-
SSDEEP
98304:4F0w68qGhQT4gTChsSbxKRlPIF/0/w9KZigNFTUgIvrxowNQdKBX:UAahQTB+hsSbyxACig3svtdmK
Malware Config
Extracted
alienbot
http://1vq90ijfs1rqa6ngork8.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
pid Process 5161 fr.privately.Christmas 5161 fr.privately.Christmas 5161 fr.privately.Christmas 5161 fr.privately.Christmas 5161 fr.privately.Christmas 5161 fr.privately.Christmas 5161 fr.privately.Christmas -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/fr.privately.Christmas/app_DynamicOptDex/uQv.json 5161 fr.privately.Christmas -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId fr.privately.Christmas Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText fr.privately.Christmas Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId fr.privately.Christmas -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener fr.privately.Christmas -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser fr.privately.Christmas -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock fr.privately.Christmas -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground fr.privately.Christmas -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.privately.Christmas android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.privately.Christmas android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.privately.Christmas android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.privately.Christmas android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.privately.Christmas android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.privately.Christmas android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.privately.Christmas android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fr.privately.Christmas -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone fr.privately.Christmas -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver fr.privately.Christmas -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule fr.privately.Christmas -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo fr.privately.Christmas -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo fr.privately.Christmas
Processes
-
fr.privately.Christmas1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:5161
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497B
MD558e33519dcd8c7ee683c1ceeaa6f6467
SHA1643e7d6001be1d9caf2c27dd7917c80611b6b3f4
SHA256b668814961b8e7235bf7f6bc02607d2bf50ea86a897547e460a55eb9821dea3a
SHA512e85dd8ac744ce90d2d93322cfa157fcae72a419a3c010fcee9c8242eb0a036c05e2fd40b86c188b0880593abd103b2afddd61e7962000c4affbb7f364a6f3fbb
-
Filesize
697KB
MD57edee01f9fd47f331dab1e23847380bc
SHA12dd5fc56be28a958e4dd8e6ba86dc270bd97143e
SHA2561d302038f62cf089a3fcb3e2624b858ee9822a3f5c2f09db968378ae9980cb33
SHA5128cf4afcfcb1e64d1df8bc32081203f136b6c210d4d392b0297aa1ba0633896e877a8670ddc71230d187f5e4a8e1779fcda0afea42b4735a9312eb113cd6e889a
-
Filesize
697KB
MD57b45188041689f3e611840825e524967
SHA1f2d4b419d7da4c3b4d80558b89528cf2f75d28c6
SHA25679540fa1cbe7885551463819a422f7dc8553f1774e582e9ac78b5d19d53915d7
SHA5121811c74abe5f850a71b29dc27ff9b4eb68a960f510b251ae88b1a7b6a6abce871a1d21ef74d683a0fabdfde5e5def9aab54761912ec37704a03a439b8ee70df7
-
Filesize
903KB
MD55a300404b605011ebec369100950a437
SHA185e9314c0b3b9242ebed0ae95d3571cbc07806c2
SHA256a221a2f89e25dc59c1f181645d13a1eaa3ad901e0fd6c200e8bec1cfbec0ca0b
SHA512e74afda43dc61d935f75e15d55878c7a5170249d5dd6edfd598f4c0c5a7bf4c4bd2638c93fee29924786a533ee6023fa8f178a1c1e5269efa68d687a6b3d662e