Analysis
-
max time kernel
119s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
27-11-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4.apk
-
Size
1.3MB
-
MD5
78e0cfe2ab9ef072be32319d756b8472
-
SHA1
7a90ce611490ae1a84eb7028419e6b3b77d27ccd
-
SHA256
41b9a5f1a347465d4471f89f37c621d4946266c113a20411eac49c915522e5f4
-
SHA512
3c0a12b894f54abef562c67d3c9cfa2ea91c984b9e9f7ca43fe80dbe8191ca562ae4e291366b66fab28f446de258a9230b3f87460ef282672fac11fa60283895
-
SSDEEP
24576:GQjlXllX6MuanL5hggyiJuvDMrJJ+JBrohp6kAnEP0Zt3q58xAL:tuOL5hggvsvDQJJ+JBshp6rEP0+KxAL
Malware Config
Extracted
alienbot
https://ramosahneleri.net
Extracted
alienbot
https://ramosahneleri.net
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 1 IoCs
resource yara_rule behavioral3/memory/4789-0.dex family_cerberus -
pid Process 4789 com.domain.special 4789 com.domain.special 4789 com.domain.special 4789 com.domain.special 4789 com.domain.special -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.domain.special/app_DynamicOptDex/jw.json 4789 com.domain.special -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.domain.special Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.domain.special -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.domain.special -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.domain.special -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.domain.special -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.domain.special android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.domain.special -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.domain.special -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.domain.special
Processes
-
com.domain.special1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4789
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD5639ab35f9f51613dc40a3cddbd33cc33
SHA1a4b686bedd74a9a4ef047bd01ac39ff711a03ac5
SHA256d98a7d51bafd8fca2ee9de5bb54e1c6d62aa88db82148761b20c569ee225c198
SHA512905a8b8718aad01bc3635e5a06a5fa5a9b7a250f25bd8a592f0267dd68534d89d5b934df13f48236caa418bffdb5c534c992f65813ec23d804b1779c2f24c424
-
Filesize
238KB
MD5d9416c04bd2c971c54649226a24e3eab
SHA1e44835cb24a18f2f5cf2a947f426f3134ce679b8
SHA256e161058d3335fe864e11a7d6a7a1b2688bb54bc4f0e0a109a244973f7cfd612f
SHA5125ab61d8d0f9f17317f3414cf3c46e60e4d5972663d43abab7745c6c3f6dfb3a4e932d6281fa9814ddc04f98f80486a0f536cc2d8091dcc05f8eaaab1507e197a
-
Filesize
483KB
MD5eca424e286f028877957a7b6b2ed6f55
SHA1622183dc855c84a0b564aeb98fd36ea7a4c1cdf5
SHA2568a3124b5fbec659ad22af414838fa2f3cc5917dcb2ee08764b4f20c105199b83
SHA512322a02fb94951a1c6f17f6f0169f2643f7de758ceb7c3e758488007a0ec3a980735e0496de12471e924133948151ae9d4d5c282084a71050934939d52dd440df