Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
158s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
09/11/2024, 22:05 UTC
Behavioral task
behavioral1
Sample
504c737c440e9195a40512dcfae4978e4d8ca305b89b1aefbba418d772d16c78.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
504c737c440e9195a40512dcfae4978e4d8ca305b89b1aefbba418d772d16c78.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
504c737c440e9195a40512dcfae4978e4d8ca305b89b1aefbba418d772d16c78.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
504c737c440e9195a40512dcfae4978e4d8ca305b89b1aefbba418d772d16c78.apk
-
Size
1.3MB
-
MD5
7976601149e04fc939bfbc8e552c74cc
-
SHA1
8f7865a16219a938ed36a328e30c86851a52f288
-
SHA256
504c737c440e9195a40512dcfae4978e4d8ca305b89b1aefbba418d772d16c78
-
SHA512
3c97d7318ff4789631d0e9a1cb391b41a8af956e93add979434597147c2017f688897e856043b378e85056596ebcb04e6a8930fcace37e8e3d6cb2fe7d043b69
-
SSDEEP
24576:ZZPV1hz3QDP1YFw/RNj9amEFwfFcjw9bN7YYFB+8sGCOCjC3eFKAxi+NMXByzL5w:ZZPfh8xWwZ+wf0wv7b+iNXQKAE+NUBye
Malware Config
Extracted
alienbot
http://telsmlebaglanhayata.net
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
pid Process 5070 com.mhiauaqmlacl.ypmsfwbkjhsbeoz 5070 com.mhiauaqmlacl.ypmsfwbkjhsbeoz 5070 com.mhiauaqmlacl.ypmsfwbkjhsbeoz 5070 com.mhiauaqmlacl.ypmsfwbkjhsbeoz 5070 com.mhiauaqmlacl.ypmsfwbkjhsbeoz 5070 com.mhiauaqmlacl.ypmsfwbkjhsbeoz 5070 com.mhiauaqmlacl.ypmsfwbkjhsbeoz 5070 com.mhiauaqmlacl.ypmsfwbkjhsbeoz -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mhiauaqmlacl.ypmsfwbkjhsbeoz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mhiauaqmlacl.ypmsfwbkjhsbeoz -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.mhiauaqmlacl.ypmsfwbkjhsbeoz -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mhiauaqmlacl.ypmsfwbkjhsbeoz -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mhiauaqmlacl.ypmsfwbkjhsbeoz -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mhiauaqmlacl.ypmsfwbkjhsbeoz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mhiauaqmlacl.ypmsfwbkjhsbeoz -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mhiauaqmlacl.ypmsfwbkjhsbeoz -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mhiauaqmlacl.ypmsfwbkjhsbeoz
Processes
-
com.mhiauaqmlacl.ypmsfwbkjhsbeoz1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:5070
Network
-
Remote address:1.1.1.1:53Requestandroid.apis.google.comIN AResponseandroid.apis.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A216.58.204.78
-
Remote address:1.1.1.1:53Requestssl.google-analytics.comIN AResponsessl.google-analytics.comIN A216.58.204.72
-
Remote address:1.1.1.1:53Requestjsonplaceholder.typicode.comIN AResponsejsonplaceholder.typicode.comIN A104.21.59.19jsonplaceholder.typicode.comIN A172.67.167.151
-
Remote address:104.21.59.19:443RequestPOST /posts HTTP/1.1
Content-Length: 15
Content-Type: application/x-www-form-urlencoded
User-Agent: Dalvik/2.1.0 (Linux; U; Android 10; Pixel 2 Build/QSR1.210802.001)
Host: jsonplaceholder.typicode.com
Connection: Keep-Alive
Accept-Encoding: gzip
ResponseHTTP/1.1 201 Created
Content-Type: application/json; charset=utf-8
Content-Length: 40
Connection: keep-alive
Report-To: {"group":"heroku-nel","max_age":3600,"endpoints":[{"url":"https://nel.heroku.com/reports?ts=1731189965&sid=e11707d5-02a7-43ef-b45e-2cf4d2036f7d&s=o8YyPOOc5cWqZpj01il4ZgqcRZDr1d2Y3vv2obRtt7k%3D"}]}
Reporting-Endpoints: heroku-nel=https://nel.heroku.com/reports?ts=1731189965&sid=e11707d5-02a7-43ef-b45e-2cf4d2036f7d&s=o8YyPOOc5cWqZpj01il4ZgqcRZDr1d2Y3vv2obRtt7k%3D
Nel: {"report_to":"heroku-nel","max_age":3600,"success_fraction":0.005,"failure_fraction":0.05,"response_headers":["Via"]}
X-Powered-By: Express
X-Ratelimit-Limit: 1000
X-Ratelimit-Remaining: 998
X-Ratelimit-Reset: 1731189982
Vary: Origin, X-HTTP-Method-Override, Accept-Encoding
Access-Control-Allow-Credentials: true
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Access-Control-Expose-Headers: Location
Location: https://jsonplaceholder.typicode.com/posts/101
X-Content-Type-Options: nosniff
Etag: W/"28-qTfHrE6INSRTzBnUDwZIeKeN1Wk"
Via: 1.1 vegur
cf-cache-status: DYNAMIC
Server: cloudflare
CF-RAY: 8e011ba2feeabef8-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=28267&sent=6&recv=6&lost=0&retrans=0&sent_bytes=3114&recv_bytes=874&delivery_rate=153714&cwnd=252&unsent_bytes=0&cid=a72756d70ee4d521&ts=473&x=0"
-
Remote address:1.1.1.1:53Requesttelsmlebaglanhayata.netIN AResponse
-
1.2kB 40 B 1 1
-
914 B 40 B 1 1
-
914 B 40 B 1 1
-
4.5kB 8.5kB 15 21
-
2.3kB 40 B 1 1
-
1.3kB 6.2kB 8 8
-
1.3kB 5.6kB 8 10
HTTP Request
POST https://jsonplaceholder.typicode.com/postsHTTP Response
201 -
128 B 40 B 2 1
-
3.8kB 12
-
69 B 109 B 1 1
DNS Request
android.apis.google.com
DNS Response
216.58.204.78
-
70 B 86 B 1 1
DNS Request
ssl.google-analytics.com
DNS Response
216.58.204.72
-
74 B 106 B 1 1
DNS Request
jsonplaceholder.typicode.com
DNS Response
104.21.59.19172.67.167.151
-
69 B 142 B 1 1
DNS Request
telsmlebaglanhayata.net
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1