Analysis

  • max time kernel
    146s
  • max time network
    138s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    03-11-2024 22:12

General

  • Target

    d6ba9353f0557aafd8d64c2621c9fbd92aeadaf791a6ba1bde9451bb62e7bbfa.apk

  • Size

    1.9MB

  • MD5

    c05f39c01d0a631eb235c2dc1e2e3f7b

  • SHA1

    16b001deb9dac8d3e1620329bad18e22634580af

  • SHA256

    d6ba9353f0557aafd8d64c2621c9fbd92aeadaf791a6ba1bde9451bb62e7bbfa

  • SHA512

    123467466e7a009f94632a631073a389361ae92e4f845a05125815533c6108a5b8c37215e6c5d6d9cd82bd316cebe5a6429928761a599468d874b9e9b2ed6bb1

  • SSDEEP

    49152:oZKnMLkhYWxbr9UKWI4W9q8c+o8WM/fhcQw1qsxCHcUTi6Yq:oZKnM4hFxbr32W0so8HfhG1qsxgJ

Malware Config

Extracted

Family

alienbot

C2

http://weatherforeveryday.site

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Alienbot family
  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus family
  • Cerberus payload 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 3 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • com.jar.flower
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries account information for other applications stored on the device
    • Performs UI accessibility actions on behalf of the user
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    PID:5052

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.jar.flower/app_DynamicOptDex/Omnls.json

    Filesize

    238KB

    MD5

    73735f255a7fb15d80ed2b34c586c18c

    SHA1

    9bd9a8dcc8bcf1e8ae46c5ada9b19c4ccadef671

    SHA256

    f615f3b9485b07efa30385b68df424fea4fda14124ea0b7df93538db15b0d0f7

    SHA512

    cc67f9698533a3c2c0f48991374ddf902fe415fa54df9abd661fea5e414a7bfa9629112bbe58120042aa23dc1b47be3d48d72f7054f1b932abfef5f838246e85

  • /data/data/com.jar.flower/app_DynamicOptDex/Omnls.json

    Filesize

    238KB

    MD5

    f7d37c650cc2ee87475a3403489bb838

    SHA1

    632f0855b61131b362a312429a3e7725bbba5fe7

    SHA256

    d783f69f7b993bfd3d92cedc3b65d827f55d11b52530323e9f44033fbb378a89

    SHA512

    144357278fa340f2c85bc990078bb26419e77f4c291ba23480a01bacaa633139bff6bb61f41fd8030ec721382262d6d574915ca4360203fdc8fc2e8cd502db40

  • /data/data/com.jar.flower/app_DynamicOptDex/oat/Omnls.json.cur.prof

    Filesize

    431B

    MD5

    10e99ddfcee6490ab3d6daf9d450d3f9

    SHA1

    f0245ae296b3be95fb8f69a703bade08e5aacf51

    SHA256

    c6911cb04518faacd2943df53b866922369a2309b43a008e22584eeccde565e9

    SHA512

    77a92be3fb324ebb9154f5889405edec4e9765dc989585e0b84ab5d6e89f14e3e33a09d51582d92d99b098c7fb4d4f5a7d62190b539edacf9976e55fb5b51040

  • /data/user/0/com.jar.flower/app_DynamicOptDex/Omnls.json

    Filesize

    482KB

    MD5

    3c66ef052da261eaa600c3233dcd8904

    SHA1

    74eb88d29e76fb0ed92e43f9bbe984b685c93f01

    SHA256

    43dd16352600970908431eb21b6464543db71ea002681151447793b6d74612cc

    SHA512

    62f9de427a9837472bd23f902d93e492f28eff172e834cd47ecadb0380e5f866efaee6810467256488c3b153d260d20b7ec7379f9bdce8af97f81af90b25eff1