Overview
overview
10Static
static
601e6cb93ee...9e.apk
android-9-x86
1001e6cb93ee...9e.apk
android-10-x64
1001e6cb93ee...9e.apk
android-11-x64
10197359a4d8...d7.apk
android-9-x86
10197359a4d8...d7.apk
android-11-x64
102427241add...70.apk
android-9-x86
102427241add...70.apk
android-10-x64
10282a7cfccb...bd.apk
android-9-x86
10282a7cfccb...bd.apk
android-10-x64
10284d74a6fb...fa.apk
android-9-x86
10284d74a6fb...fa.apk
android-13-x64
103221126c35...63.apk
android-9-x86
103221126c35...63.apk
android-10-x64
103f3ab2cd7e...bf.apk
android-9-x86
103f3ab2cd7e...bf.apk
android-10-x64
1043e48ed5f6...fc.apk
android-9-x86
1043e48ed5f6...fc.apk
android-11-x64
10616c4ad548...8a.apk
android-9-x86
10616c4ad548...8a.apk
android-13-x64
1074aca9fcfb...e6.apk
android-9-x86
1074aca9fcfb...e6.apk
android-13-x64
10753c262257...1d.apk
android-9-x86
10753c262257...1d.apk
android-13-x64
1083684d8fa6...97.apk
android-9-x86
1083684d8fa6...97.apk
android-13-x64
1084b4b256e4...0f.apk
android-9-x86
1084b4b256e4...0f.apk
android-13-x64
10865e193b3c...3d.apk
android-9-x86
10865e193b3c...3d.apk
android-11-x64
108734504205...3f.apk
android-9-x86
108734504205...3f.apk
android-11-x64
10950867a96c...32.apk
android-9-x86
10Analysis
-
max time kernel
140s -
max time network
151s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
23-11-2024 11:00
Static task
static1
Behavioral task
behavioral1
Sample
01e6cb93ee9ab6e67340d1f9e6ede5efc9c64f9e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
01e6cb93ee9ab6e67340d1f9e6ede5efc9c64f9e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
01e6cb93ee9ab6e67340d1f9e6ede5efc9c64f9e.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
197359a4d8548b72c8e14e6d75d612ded5cfc3d7.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
197359a4d8548b72c8e14e6d75d612ded5cfc3d7.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral6
Sample
2427241add3123a2e6fba0aa091c487816d9b670.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral7
Sample
2427241add3123a2e6fba0aa091c487816d9b670.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral8
Sample
282a7cfccb03ab7ca7fa3eeb9a4cc28e262e2abd.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral9
Sample
282a7cfccb03ab7ca7fa3eeb9a4cc28e262e2abd.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral10
Sample
284d74a6fbc2c12745c475bc0d2f24e9b43488fa.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral11
Sample
284d74a6fbc2c12745c475bc0d2f24e9b43488fa.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral12
Sample
3221126c3590df52f238b0dcbfd5e77b226a8a63.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral13
Sample
3221126c3590df52f238b0dcbfd5e77b226a8a63.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral14
Sample
3f3ab2cd7eea46a0b7061f692401952b6bf4fdbf.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral15
Sample
3f3ab2cd7eea46a0b7061f692401952b6bf4fdbf.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral16
Sample
43e48ed5f674dcf241ba8b9456162b97f671f7fc.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral17
Sample
43e48ed5f674dcf241ba8b9456162b97f671f7fc.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral18
Sample
616c4ad548e04baba19d12f04a427019c2a7c78a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral19
Sample
616c4ad548e04baba19d12f04a427019c2a7c78a.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral20
Sample
74aca9fcfbe1a787b6ffec5e35155d664f5679e6.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral21
Sample
74aca9fcfbe1a787b6ffec5e35155d664f5679e6.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral22
Sample
753c262257602605e79946ed42fa855da101761d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral23
Sample
753c262257602605e79946ed42fa855da101761d.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral24
Sample
83684d8fa6a73bbbf2e402757e6ccf4b2018c497.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral25
Sample
83684d8fa6a73bbbf2e402757e6ccf4b2018c497.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral26
Sample
84b4b256e482bad6dfa694a96e9b4ea5fcc9fc0f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral27
Sample
84b4b256e482bad6dfa694a96e9b4ea5fcc9fc0f.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral28
Sample
865e193b3c83f15cfb0a180dd33affaed8bfab3d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral29
Sample
865e193b3c83f15cfb0a180dd33affaed8bfab3d.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral30
Sample
8734504205b5cdf1ea4c0e2d62a0dcf8500dc73f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral31
Sample
8734504205b5cdf1ea4c0e2d62a0dcf8500dc73f.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral32
Sample
950867a96cc81824ec348bc9340f283c139d7832.apk
Resource
android-x86-arm-20240624-en
General
-
Target
01e6cb93ee9ab6e67340d1f9e6ede5efc9c64f9e.apk
-
Size
1.1MB
-
MD5
53138b3f0f98b6433d28b5aef525f7b3
-
SHA1
01e6cb93ee9ab6e67340d1f9e6ede5efc9c64f9e
-
SHA256
31b0c269aebb2c98f47d73b0224f29a39ee0eac0b0f4989e741acf1e0606124d
-
SHA512
2a010c4013891417e9d6f4e8a32d8f20b71f2d5aaf401ea071ad8099270dd0aee29402c6c78862bf1e4ce1c341fa9cc1785fbafd43aee6975e8c052142f74a82
-
SSDEEP
24576:9rp4PsCmh+Tsn3m+wK536DCIMjyBugmhUpk3Ka1oob9jU4R7QHoHO2Edq:N6y+wn3mEGij6g5v1LNR7WZ2N
Malware Config
Extracted
alienbot
http://84.32.214.45
Extracted
alienbot
http://84.32.214.45
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 2 IoCs
resource yara_rule behavioral1/memory/4283-0.dex family_cerberus behavioral1/memory/4257-0.dex family_cerberus -
pid Process 4257 com.cable.sword -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.cable.sword/app_DynamicOptDex/Pn.json 4283 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cable.sword/app_DynamicOptDex/Pn.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.cable.sword/app_DynamicOptDex/oat/x86/Pn.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.cable.sword/app_DynamicOptDex/Pn.json 4257 com.cable.sword -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cable.sword Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cable.sword -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.cable.sword -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.cable.sword -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.cable.sword -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cable.sword android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cable.sword -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.cable.sword -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.cable.sword -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.cable.sword -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.cable.sword -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.cable.sword -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.cable.sword
Processes
-
com.cable.sword1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4257 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cable.sword/app_DynamicOptDex/Pn.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.cable.sword/app_DynamicOptDex/oat/x86/Pn.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4283
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD5242ff55710b86a773739a04e09fad3d9
SHA189036ad92697e41d41e457f892e7bf3bc0567fa3
SHA2562c6b3ead0237ffa7fca6e26b88661e9bf2b3f672f7955ef9ec53f1d9f9bdfd46
SHA512f9b2cb2cd7cf11ae6f01869570cb08241ebfcf33acd8581f8b3e5e4b5d84a08b50d8802581a4f11e09da6e68651cd8c492512fd7725cedf961c1a7951b3f4643
-
Filesize
238KB
MD577c71ae64968cf1f0089cfef960d0052
SHA1bf192d2d6a9ae2c43f0b9d98bf7a167fbc9531cf
SHA2569d1bd8a3f8147ffba0380fe5317b78555224abaa84c11279937bb6f8f3d80a10
SHA5125a7f51cbb23af8cfc7c92e7430c644ea25faeee356a2ae391c0974a712e48059dc9c4eab2a80d9fbec93e5af09aaf447d79406edc38854d4b7fb0804652fc98f
-
Filesize
468B
MD55440b50b38ea81960d5f86fefeacf1a2
SHA17d66f570d29c9c075ddb92ef1a53d5fcea0f6f82
SHA256ea679cbc6e46493139063526ed14e537ca9a97af4ca92ec0e66f54a8101123b4
SHA5121820c111dffe966b537d858100c3b9d87630ff0141f01f0c8994c3185371a11a2f05b1176287e34c43066bb39918c2a843e261ff481bb0ee5844d9e9a80be4ba
-
Filesize
483KB
MD5b40626f5f734e870ff1ffb2ef06f1c59
SHA19db3a7aea2b821057f33fe93778d112c9f4e5e4f
SHA256f60f1f52dc5078e5cdaac523332adc0301b7b9b2f0ea1eab1cc4f4565179da70
SHA5122b3d1d57992f1f6bba08bd08ce9e5399ede2b3ea22aa2e4eeeccfa6fbb8ae7ba94eb178bd45910d323a09e6072c42a9dbfbdedf5c5299b5b474def9e06e38ff9
-
Filesize
483KB
MD597ec800f656664eeb0cdda11478068b0
SHA102db30a789b44b816e8f356cda5b5602b9611da4
SHA2561bdad53f20f3fe0e17204cac9c0478faf624ead18175d99276ebd333bfd7b0e8
SHA5126a9a03071e4272e4ce5222f9b4827601eaddf154718c48f3d00323da7e55fbaf2a15f195732f1a19d48ea43260806150b71414b980d534ae7c7a914d8c30580d