Analysis
-
max time kernel
141s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
27-11-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4.apk
-
Size
1.3MB
-
MD5
78e0cfe2ab9ef072be32319d756b8472
-
SHA1
7a90ce611490ae1a84eb7028419e6b3b77d27ccd
-
SHA256
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4
-
SHA512
3c0a12b894f54abef562c67d3c9cfa2ea91c984b9e9f7ca43fe80dbe8191ca562ae4e291366b66fab28f446de258a9230b3f87460ef282672fac11fa60283895
-
SSDEEP
24576:GQjlXllX6MuanL5hggyiJuvDMrJJ+JBrohp6kAnEP0Zt3q58xAL:tuOL5hggvsvDQJJ+JBshp6rEP0+KxAL
Malware Config
Extracted
alienbot
https://ramosahneleri.net
Extracted
alienbot
https://ramosahneleri.net
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4280-0.dex family_cerberus behavioral1/memory/4253-0.dex family_cerberus -
Processes:
com.domain.specialpid Process 4253 com.domain.special -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
Processes:
com.domain.specialdescription ioc Process Accessed system property key: ro.product.model com.domain.special -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.domain.special/app_DynamicOptDex/jw.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.domain.special/app_DynamicOptDex/oat/x86/jw.odex --compiler-filter=quicken --class-loader-context=&com.domain.specialioc pid Process /data/user/0/com.domain.special/app_DynamicOptDex/jw.json 4280 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.domain.special/app_DynamicOptDex/jw.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.domain.special/app_DynamicOptDex/oat/x86/jw.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.domain.special/app_DynamicOptDex/jw.json 4253 com.domain.special -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.domain.specialdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.domain.special Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.domain.special -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
com.domain.specialdescription ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.domain.special -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.domain.specialdescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.domain.special -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.domain.specialdescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.domain.special -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.domain.specialioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.domain.special android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.domain.special -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.domain.specialdescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.domain.special -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.domain.specialdescription ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.domain.special -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.domain.specialdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver com.domain.special -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.domain.specialdescription ioc Process Framework service call android.app.job.IJobScheduler.schedule com.domain.special -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.domain.specialdescription ioc Process File opened for read /proc/cpuinfo com.domain.special -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.domain.specialdescription ioc Process File opened for read /proc/meminfo com.domain.special
Processes
-
com.domain.special1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4253 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.domain.special/app_DynamicOptDex/jw.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.domain.special/app_DynamicOptDex/oat/x86/jw.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4280
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD5639ab35f9f51613dc40a3cddbd33cc33
SHA1a4b686bedd74a9a4ef047bd01ac39ff711a03ac5
SHA256d98a7d51bafd8fca2ee9de5bb54e1c6d62aa88db82148761b20c569ee225c198
SHA512905a8b8718aad01bc3635e5a06a5fa5a9b7a250f25bd8a592f0267dd68534d89d5b934df13f48236caa418bffdb5c534c992f65813ec23d804b1779c2f24c424
-
Filesize
238KB
MD5d9416c04bd2c971c54649226a24e3eab
SHA1e44835cb24a18f2f5cf2a947f426f3134ce679b8
SHA256e161058d3335fe864e11a7d6a7a1b2688bb54bc4f0e0a109a244973f7cfd612f
SHA5125ab61d8d0f9f17317f3414cf3c46e60e4d5972663d43abab7745c6c3f6dfb3a4e932d6281fa9814ddc04f98f80486a0f536cc2d8091dcc05f8eaaab1507e197a
-
Filesize
468B
MD5e3fbd932a8fb6b1c1ef6a63d6d398a8d
SHA1a318196a10a2cdbe1a1fd647f09249061f187e7d
SHA256301ad441513b87cedf9e1721f11a1d480c686dc6ac5d6199178dc159f3f820e5
SHA512feb4012f811cde77a32c65ae30bf0437148a18ddc2849f9b7fac37eadf9b8a372e764f767b8f55d93996768d3b679eba4a62a53c84f7e5b4292212c9417f2562
-
Filesize
483KB
MD59e36942982a565b579e639e7196cce75
SHA1c38dcdc337e8ecea4b97c05d16798f085c447294
SHA256387733008456aeb93731ce94f460612a4eacec3ec827c33dba872eabec6cc60b
SHA512f57122cec19091940672f36fb5ff09fef58e194ddd6e83f41e34b2af4959f67a3189a762ea9f3005a20cbfd46e14fa7d2ba88ef09f65d8e7a8b589c58c7a6882
-
Filesize
483KB
MD5eca424e286f028877957a7b6b2ed6f55
SHA1622183dc855c84a0b564aeb98fd36ea7a4c1cdf5
SHA2568a3124b5fbec659ad22af414838fa2f3cc5917dcb2ee08764b4f20c105199b83
SHA512322a02fb94951a1c6f17f6f0169f2643f7de758ceb7c3e758488007a0ec3a980735e0496de12471e924133948151ae9d4d5c282084a71050934939d52dd440df