Analysis
-
max time kernel
149s -
max time network
155s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
21-12-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58.apk
-
Size
3.4MB
-
MD5
92f5b5deacc307f5dbeddaa10829660a
-
SHA1
4de9eb452a882a0be46cda98029716dca910b3f3
-
SHA256
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58
-
SHA512
168fcaeeed3c5944687f95176753b2098b1b480e7f65506ea3053bdb2098e14023622e3667602c0d8b110db51e6f38d048a8890fea29f31a687a98eb7bd20857
-
SSDEEP
98304:SCw10bcOm3tdvG9TOmsvyCGqZYf97B7lpQpYpuXt/D/rB30Up:SwbcOWnvG9TOYwG97B7eYcxD/rBNp
Malware Config
Extracted
cerberus
Extracted
alienbot
http://217.8.117.104
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 1 IoCs
resource yara_rule behavioral2/memory/5246-0.dex family_cerberus -
pid Process 5246 com.ucuadqxoj 5246 com.ucuadqxoj 5246 com.ucuadqxoj 5246 com.ucuadqxoj 5246 com.ucuadqxoj 5246 com.ucuadqxoj 5246 com.ucuadqxoj 5246 com.ucuadqxoj -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ucuadqxoj/cache/payload.jar 5246 com.ucuadqxoj -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ucuadqxoj Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ucuadqxoj -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.ucuadqxoj -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ucuadqxoj android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ucuadqxoj -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ucuadqxoj -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.ucuadqxoj
Processes
-
com.ucuadqxoj1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Performs UI accessibility actions on behalf of the user
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:5246
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
422B
MD51f5c61da46ea55a7054f14e21abe0b86
SHA139a18ac102ba391060b81c390d7c50ddaf4cdae0
SHA256cb45f3df80c4d6f730f4b9d10626c212bc1066a41b2e9b8b51c329282690c6c9
SHA51251b3fd9afc5b7a0dff04481c905071c904f84afa6942698d73989e7ef1334392a41cf20b7147eb57db0ad9b34a1483a0a96200b85c7167aeabddd09b526aff86
-
Filesize
269KB
MD52c71af739b725732bc7409da870f1b01
SHA165122134f0af886a0cba79388494fa69fb89015b
SHA256db9f83468daf09f671b75412b0f380c044000677e1c096ef9514e33e8c1c238d
SHA512f25cfd7aa47994715d0b6efa23882b4c89c87b5ff4bb2ac566d139b6b6e8ddbbefc57a8a1dbc802061a404d965fd1977f83fbaddd5cc87a5dd811e743c46a3df
-
Filesize
512KB
MD5e509eeb11454e83ef776251a753488c4
SHA176b5813d03e27a8f8746ee9694774dfd7768aa4e
SHA256f1e98d8910917f15db1c5780fdd082ce27a7ecce40f363ecd07d0f8091332b77
SHA512b9e4d4972f717f155e92f1431c61c3d4b627ed996470d158a5ea1b6ebe23f84a3a44da73c53f70ae13f255e1263f1741628976c5e877727f25556d95dc58c7d1