Analysis
-
max time kernel
148s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
09-12-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
c56cf18d8eb2a58ca12a6f4db29766a210997ab45f54dc3056d697a8008c03c7.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c56cf18d8eb2a58ca12a6f4db29766a210997ab45f54dc3056d697a8008c03c7.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
c56cf18d8eb2a58ca12a6f4db29766a210997ab45f54dc3056d697a8008c03c7.apk
-
Size
3.6MB
-
MD5
3a9d2d0920003b58240bdedfeb48daa1
-
SHA1
2f42dea8c664b41fdc38c6c6a589efbb7b457256
-
SHA256
c56cf18d8eb2a58ca12a6f4db29766a210997ab45f54dc3056d697a8008c03c7
-
SHA512
12323a85d6bc9d9d7c67e85658e8cdf6cfa9fb6c6bba5e722501152ac85f0cb2910ddb0d350a93b0bfd6d3dbcb9ef7f23b96f68315f58aab8addf9a2362e52f5
-
SSDEEP
98304:NmY+5nWaS+Fc4obXXh9fKZfaciD1/4/b9XPgJmFmyg+/W8M0e3r5Ip60hUqE:a5WL9z+fsQhPBFE+eac93OLE
Malware Config
Extracted
alienbot
http://buuc5x0r7x98fj40mg2x.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
pid Process 4265 ru.discourage.everywhere 4265 ru.discourage.everywhere 4265 ru.discourage.everywhere 4265 ru.discourage.everywhere 4265 ru.discourage.everywhere 4265 ru.discourage.everywhere 4265 ru.discourage.everywhere -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/ru.discourage.everywhere/app_DynamicOptDex/ejnKGvRYNFQM.json 4290 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/ru.discourage.everywhere/app_DynamicOptDex/ejnKGvRYNFQM.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/ru.discourage.everywhere/app_DynamicOptDex/oat/x86/ejnKGvRYNFQM.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/ru.discourage.everywhere/app_DynamicOptDex/ejnKGvRYNFQM.json 4265 ru.discourage.everywhere -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId ru.discourage.everywhere Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText ru.discourage.everywhere Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId ru.discourage.everywhere -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser ru.discourage.everywhere -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock ru.discourage.everywhere -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground ru.discourage.everywhere -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone ru.discourage.everywhere -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS ru.discourage.everywhere -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver ru.discourage.everywhere -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule ru.discourage.everywhere -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo ru.discourage.everywhere -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo ru.discourage.everywhere
Processes
-
ru.discourage.everywhere1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4265 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/ru.discourage.everywhere/app_DynamicOptDex/ejnKGvRYNFQM.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/ru.discourage.everywhere/app_DynamicOptDex/oat/x86/ejnKGvRYNFQM.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4290
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5aba0873d7bb6b794dc14f147c7ddfa02
SHA17a2f9397f38153d9537c78ed511e4563fd0b8ab3
SHA256285e26b0982f1a4259fa167c699e49a50eb509e47950ece139a8a79c46566754
SHA512e0c2cd4dc78265e5f2fc317e3a5931d1fc00cd33c5bf25b743be82a1205da771884989854fd5bc5d2cacf6e5a5e939a13b88cd04c99e4cc356ab90b922aad87a
-
Filesize
704KB
MD511e2f902d93d234857bea50d7d91d4f8
SHA174690333f983c0cfb422b07100c36aca81a49d43
SHA256f9ec48342303a3305b8c154966f4e7f5539fde1395a3998fd97139e77e25c7f9
SHA512af2d35e84672cb6be5667e166d65a12bc876628ca577fe5cf4fe44735a052d4e5fbc31aac9df0fc42d7b229dfba205691e3b71489ac798b3d2b7c809ca05301b
-
Filesize
1KB
MD5cc0902440b411d3c2c95316d34953147
SHA1019d84dd22dc7a6968e94cdcd8f4ac5281741d71
SHA256eb688dabda33e151cc603e35f2c96619444c5387178457efb55494910983726e
SHA51247e92a86fffdabd0b8c295ff575ed9679c1d83477c7873c88769238460b63e3cc40359734781651a1f972a2d4da745b75c7090b1c4dfeb5495910b8f4e0b8ae1
-
Filesize
912KB
MD5fe21226735a66b4d2fa0be4719a65427
SHA1be99826431f5d9c3309a3cd4e63beef14c61fb1b
SHA2565fa009916e7a40eb7a861d83a0283ecac2791f2494984a3e358f77dcaa3093ba
SHA512bc72227b67fbb97440b965467e4268d12336c2f0e40553d6e8ad39ae4b67541f1b926951d123e56d9dd848d9f22ae6aa8d621b78c51608c40aeef2517a0756de
-
Filesize
912KB
MD5278d8340cb830ccfe4e75c1569bd676b
SHA1fe3d81270cd3ed76470ce8219118f4664d33f873
SHA256c1d4ebbdddec725d4f0dcac2cdf062d7f6a0c18e49936c60f82ec2ee20302cd9
SHA51221c896a31b50ad9fef53d7410194097ad9c37b54bf0f5201d4a6e5188464be812be0eaa44efc2c2d26d4a6a10c7e740abe2004990fa9adb267d75d8077e0823d