Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
156s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
21/12/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58.apk
-
Size
3.4MB
-
MD5
92f5b5deacc307f5dbeddaa10829660a
-
SHA1
4de9eb452a882a0be46cda98029716dca910b3f3
-
SHA256
ac96473138cc210721102777a2b766f023cb31dfd24a96292149145f5c4f2c58
-
SHA512
168fcaeeed3c5944687f95176753b2098b1b480e7f65506ea3053bdb2098e14023622e3667602c0d8b110db51e6f38d048a8890fea29f31a687a98eb7bd20857
-
SSDEEP
98304:SCw10bcOm3tdvG9TOmsvyCGqZYf97B7lpQpYpuXt/D/rB30Up:SwbcOWnvG9TOYwG97B7eYcxD/rBNp
Malware Config
Extracted
cerberus
Extracted
alienbot
http://217.8.117.104
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 1 IoCs
resource yara_rule behavioral3/memory/4785-0.dex family_cerberus -
pid Process 4785 com.ucuadqxoj 4785 com.ucuadqxoj 4785 com.ucuadqxoj 4785 com.ucuadqxoj 4785 com.ucuadqxoj 4785 com.ucuadqxoj 4785 com.ucuadqxoj 4785 com.ucuadqxoj -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ucuadqxoj/cache/payload.jar 4785 com.ucuadqxoj -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ucuadqxoj Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ucuadqxoj -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.ucuadqxoj -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ucuadqxoj android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ucuadqxoj -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.ucuadqxoj -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.ucuadqxoj
Processes
-
com.ucuadqxoj1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4785
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314B
MD56f865753ec7aa0d055e84452f10f674a
SHA19b2d585f7dc272a49a2e10460e3effd4dbff0379
SHA25673140568aa4267d63ea87abacaffc52d4075c9292e94432d9f24c3deefac538c
SHA5121cb9ddcfa6481cfa9b3e9df81d555809c0128b48cb1ddc6c661ef63b53c864834f9032f8e0a3dd541ece0b821af2a7cea93a9a7076cde6e6d68e9a6bc6f12dd9
-
Filesize
269KB
MD52c71af739b725732bc7409da870f1b01
SHA165122134f0af886a0cba79388494fa69fb89015b
SHA256db9f83468daf09f671b75412b0f380c044000677e1c096ef9514e33e8c1c238d
SHA512f25cfd7aa47994715d0b6efa23882b4c89c87b5ff4bb2ac566d139b6b6e8ddbbefc57a8a1dbc802061a404d965fd1977f83fbaddd5cc87a5dd811e743c46a3df
-
Filesize
512KB
MD5e509eeb11454e83ef776251a753488c4
SHA176b5813d03e27a8f8746ee9694774dfd7768aa4e
SHA256f1e98d8910917f15db1c5780fdd082ce27a7ecce40f363ecd07d0f8091332b77
SHA512b9e4d4972f717f155e92f1431c61c3d4b627ed996470d158a5ea1b6ebe23f84a3a44da73c53f70ae13f255e1263f1741628976c5e877727f25556d95dc58c7d1