Analysis
-
max time kernel
149s -
max time network
158s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
17-12-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
921e9e33af6ea92830a55fd13abb063402e6e08e480f470d8ab6b48a016aaff3.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
921e9e33af6ea92830a55fd13abb063402e6e08e480f470d8ab6b48a016aaff3.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
921e9e33af6ea92830a55fd13abb063402e6e08e480f470d8ab6b48a016aaff3.apk
-
Size
3.8MB
-
MD5
c0217aad6827cff1389d406174e2e9f2
-
SHA1
0cf0b1664c30df97bcb0ef9c1bb707927ae5731f
-
SHA256
921e9e33af6ea92830a55fd13abb063402e6e08e480f470d8ab6b48a016aaff3
-
SHA512
0f284753cb5d17955ca7edf5d086880e79d01c869a2e77b98085d38c6553625259480135c9842729974508f63e5070537cb27e383456053ee617e18211a60476
-
SSDEEP
98304:+ISPJTnlXipoJDTYgEbxvYc/T/P9IRYZNmx8XscmKNVx8wx:tSPJTnHJDk5xAUuRYZoxlQio
Malware Config
Extracted
alienbot
http://wf4sctx9cksg94528o7o.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
pid Process 4214 com.ministry.routinely 4214 com.ministry.routinely 4214 com.ministry.routinely 4214 com.ministry.routinely 4214 com.ministry.routinely 4214 com.ministry.routinely 4214 com.ministry.routinely -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ministry.routinely/app_DynamicOptDex/fjqg.json 4241 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ministry.routinely/app_DynamicOptDex/fjqg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ministry.routinely/app_DynamicOptDex/oat/x86/fjqg.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ministry.routinely/app_DynamicOptDex/fjqg.json 4214 com.ministry.routinely -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ministry.routinely Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ministry.routinely Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ministry.routinely -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.ministry.routinely -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ministry.routinely -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.ministry.routinely -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ministry.routinely android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ministry.routinely android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ministry.routinely android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ministry.routinely android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ministry.routinely android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ministry.routinely -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ministry.routinely -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.ministry.routinely -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ministry.routinely -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.ministry.routinely -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ministry.routinely -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ministry.routinely
Processes
-
com.ministry.routinely1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4214 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ministry.routinely/app_DynamicOptDex/fjqg.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ministry.routinely/app_DynamicOptDex/oat/x86/fjqg.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4241
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705KB
MD50dc40d906397e52e6240df4564c18cf1
SHA18eb4f0893825e21fa3c55b5c6e55102bf46584a0
SHA256d2ea0d4199fd7319c801b71c1bb06245d6d1ef506647aa93c3c0d98a22eb56dc
SHA5129325a3e25821a382b84d7caf71f4a7d5584fc268ad52e70319f4afcc8e4dcca33a1151980645fce4e624b5ee5190efd37e5de40ea482fb6f0ccd5094edf15384
-
Filesize
705KB
MD574982675f6e91ba1ac1609a17be687b2
SHA1ec81fb0b0e453de80d55aa274c3da0e02a6c9a9a
SHA2564b675d01576154378bc2ddd69911c052285a49c242675452f07cc46544b4d2c5
SHA5129c29d4c47e872bb262c254a7670d1490d974783d192c9bd023d0986cde0c9a8203f27c84c216ca2eceeb9410da743d78b9569ffedec8a6dd820ca2cdebd1792c
-
Filesize
1KB
MD5b6e367589a9fd85defed8de391cd796a
SHA10101fa5b30df31d616a9f0d886b59c940b262139
SHA256090397785e81f63b07435619a9f4b594e0c36c25a67d9af7587b2d51ded5b341
SHA512a268b335dbbef20b6344f15e85da369e8e490cc544db855c00d438516c88bbdcb99c8b63fff17f8c12cb1d8e22967337090070cef60bc7fcfa65be6b3d8f0a53
-
Filesize
916KB
MD57297ca6ffc483fe5b9a34a9306d43c7a
SHA1a2660352838c0a7fd44df1825791a7c92ea705a7
SHA2565ea3600733315b75fec3bc57883e9ad2813db1ab3c1cffb199d2694141f1dd0d
SHA51203d4630fba748f4ac2b636367dd51541e025875508238ed6c4b3b81c330769af263e15a03cdc90af1a464da8c608b03d4e3cc5b67615fe332db91beb1c70fd69
-
Filesize
916KB
MD5f0105bb92c0d616bb16c1ce30dc0256e
SHA10e64a1df1c89f7e9a6384595a259eaec3e44905c
SHA256d9d19e9c828254f30f179f180c43727b0ab66a29774645b859b083c6302be70c
SHA51213c885113a2f3f9ce40a376f8c537bf463894ab5304821c50a9c6711698a3b46fff46d1ee7852fad52d4a26019e7f700eea308c10411684ec1a0cb250e62ace7