Analysis
-
max time kernel
101s -
max time network
132s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
09-12-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
c56cf18d8eb2a58ca12a6f4db29766a210997ab45f54dc3056d697a8008c03c7.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c56cf18d8eb2a58ca12a6f4db29766a210997ab45f54dc3056d697a8008c03c7.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
c56cf18d8eb2a58ca12a6f4db29766a210997ab45f54dc3056d697a8008c03c7.apk
-
Size
3.6MB
-
MD5
3a9d2d0920003b58240bdedfeb48daa1
-
SHA1
2f42dea8c664b41fdc38c6c6a589efbb7b457256
-
SHA256
c56cf18d8eb2a58ca12a6f4db29766a210997ab45f54dc3056d697a8008c03c7
-
SHA512
12323a85d6bc9d9d7c67e85658e8cdf6cfa9fb6c6bba5e722501152ac85f0cb2910ddb0d350a93b0bfd6d3dbcb9ef7f23b96f68315f58aab8addf9a2362e52f5
-
SSDEEP
98304:NmY+5nWaS+Fc4obXXh9fKZfaciD1/4/b9XPgJmFmyg+/W8M0e3r5Ip60hUqE:a5WL9z+fsQhPBFE+eac93OLE
Malware Config
Extracted
alienbot
http://buuc5x0r7x98fj40mg2x.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/ru.discourage.everywhere/app_DynamicOptDex/ejnKGvRYNFQM.json 4318 ru.discourage.everywhere -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId ru.discourage.everywhere Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText ru.discourage.everywhere Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId ru.discourage.everywhere -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser ru.discourage.everywhere -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock ru.discourage.everywhere -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground ru.discourage.everywhere -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ru.discourage.everywhere -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS ru.discourage.everywhere -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule ru.discourage.everywhere
Processes
-
ru.discourage.everywhere1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4318
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5aba0873d7bb6b794dc14f147c7ddfa02
SHA17a2f9397f38153d9537c78ed511e4563fd0b8ab3
SHA256285e26b0982f1a4259fa167c699e49a50eb509e47950ece139a8a79c46566754
SHA512e0c2cd4dc78265e5f2fc317e3a5931d1fc00cd33c5bf25b743be82a1205da771884989854fd5bc5d2cacf6e5a5e939a13b88cd04c99e4cc356ab90b922aad87a
-
Filesize
704KB
MD511e2f902d93d234857bea50d7d91d4f8
SHA174690333f983c0cfb422b07100c36aca81a49d43
SHA256f9ec48342303a3305b8c154966f4e7f5539fde1395a3998fd97139e77e25c7f9
SHA512af2d35e84672cb6be5667e166d65a12bc876628ca577fe5cf4fe44735a052d4e5fbc31aac9df0fc42d7b229dfba205691e3b71489ac798b3d2b7c809ca05301b
-
Filesize
912KB
MD5278d8340cb830ccfe4e75c1569bd676b
SHA1fe3d81270cd3ed76470ce8219118f4664d33f873
SHA256c1d4ebbdddec725d4f0dcac2cdf062d7f6a0c18e49936c60f82ec2ee20302cd9
SHA51221c896a31b50ad9fef53d7410194097ad9c37b54bf0f5201d4a6e5188464be812be0eaa44efc2c2d26d4a6a10c7e740abe2004990fa9adb267d75d8077e0823d
-
Filesize
314B
MD599dc408cfc08cb47216ab0eec335b60b
SHA1b1683a8e0986dede4d40089512ac238419e4d751
SHA2561dbb0afeef74fa0507e176b7c5033c9992e0f92cafcb86ca2bfae9c2fe536a85
SHA5120692de71bc148bc895505986eb89256bbdc7e60d5362078e0255bcd4ee26c2bcddbefddcedb42dfcf3481c39937a59d14de10a3eb90b12fcde9cb9ef4ed29869