Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    android-10_x64
  • resource
    android-x64-20240910-en
  • resource tags

    arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system
  • submitted
    08-09-2024 22:25

General

  • Target

    c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3.apk

  • Size

    4.4MB

  • MD5

    551fb95cfe9ddf46002815def4cf3fc0

  • SHA1

    0990ef0cd4c4afe272b01c57a99fe4247c2de1e5

  • SHA256

    c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3

  • SHA512

    2e33b61f7633dfb94e9e57da7bfff84f79bad7e1204275c7f421a819beff44775d8c6ee3ef73e7879a1d3bb585b67a64a81ffeaf1c93be43afc3eab4e7b7799e

  • SSDEEP

    98304:4F0w68qGhQT4gTChsSbxKRlPIF/0/w9KZigNFTUgIvrxowNQdKBX:UAahQTB+hsSbyxACig3svtdmK

Malware Config

Extracted

Family

alienbot

C2

http://1vq90ijfs1rqa6ngork8.xyz

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Removes its main activity from the application launcher 1 TTPs 7 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • fr.privately.Christmas
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries account information for other applications stored on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Checks CPU information
    • Checks memory information
    PID:5161

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/fr.privately.Christmas/app_DynamicOptDex/oat/uQv.json.cur.prof

    Filesize

    497B

    MD5

    58e33519dcd8c7ee683c1ceeaa6f6467

    SHA1

    643e7d6001be1d9caf2c27dd7917c80611b6b3f4

    SHA256

    b668814961b8e7235bf7f6bc02607d2bf50ea86a897547e460a55eb9821dea3a

    SHA512

    e85dd8ac744ce90d2d93322cfa157fcae72a419a3c010fcee9c8242eb0a036c05e2fd40b86c188b0880593abd103b2afddd61e7962000c4affbb7f364a6f3fbb

  • /data/data/fr.privately.Christmas/app_DynamicOptDex/uQv.json

    Filesize

    697KB

    MD5

    7edee01f9fd47f331dab1e23847380bc

    SHA1

    2dd5fc56be28a958e4dd8e6ba86dc270bd97143e

    SHA256

    1d302038f62cf089a3fcb3e2624b858ee9822a3f5c2f09db968378ae9980cb33

    SHA512

    8cf4afcfcb1e64d1df8bc32081203f136b6c210d4d392b0297aa1ba0633896e877a8670ddc71230d187f5e4a8e1779fcda0afea42b4735a9312eb113cd6e889a

  • /data/data/fr.privately.Christmas/app_DynamicOptDex/uQv.json

    Filesize

    697KB

    MD5

    7b45188041689f3e611840825e524967

    SHA1

    f2d4b419d7da4c3b4d80558b89528cf2f75d28c6

    SHA256

    79540fa1cbe7885551463819a422f7dc8553f1774e582e9ac78b5d19d53915d7

    SHA512

    1811c74abe5f850a71b29dc27ff9b4eb68a960f510b251ae88b1a7b6a6abce871a1d21ef74d683a0fabdfde5e5def9aab54761912ec37704a03a439b8ee70df7

  • /data/user/0/fr.privately.Christmas/app_DynamicOptDex/uQv.json

    Filesize

    903KB

    MD5

    5a300404b605011ebec369100950a437

    SHA1

    85e9314c0b3b9242ebed0ae95d3571cbc07806c2

    SHA256

    a221a2f89e25dc59c1f181645d13a1eaa3ad901e0fd6c200e8bec1cfbec0ca0b

    SHA512

    e74afda43dc61d935f75e15d55878c7a5170249d5dd6edfd598f4c0c5a7bf4c4bd2638c93fee29924786a533ee6023fa8f178a1c1e5269efa68d687a6b3d662e