Analysis
-
max time kernel
147s -
max time network
153s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
11/01/2025, 22:06 UTC
Static task
static1
Behavioral task
behavioral1
Sample
e737a2cc262280811d38d3496a2f56d1f0a7cb1532fd6c804d832a47072fe5bb.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
e737a2cc262280811d38d3496a2f56d1f0a7cb1532fd6c804d832a47072fe5bb.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
e737a2cc262280811d38d3496a2f56d1f0a7cb1532fd6c804d832a47072fe5bb.apk
-
Size
3.8MB
-
MD5
009ac5e6a0d9602891a91aeeb06c8899
-
SHA1
ce6a61717ea1e34657636988b60ba0ada9ac6177
-
SHA256
e737a2cc262280811d38d3496a2f56d1f0a7cb1532fd6c804d832a47072fe5bb
-
SHA512
b2f7e5aaa106e9622837dff5d71a2f9ecbc937fb93fb7446e055f6b3e1db171199b370c943ab4c2943ffe8fa6625252d357e44316425b687792d6126ade51487
-
SSDEEP
98304:IHEOmnCK0I5f52y0Jlscy/T/m9MrmlM4WQ9a:CEOmCmRcbZ2alMX
Malware Config
Extracted
alienbot
http://kvq9t8pe7ssjps8p4iqj.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
pid Process 4223 co.scratch.broadcast 4223 co.scratch.broadcast 4223 co.scratch.broadcast 4223 co.scratch.broadcast 4223 co.scratch.broadcast 4223 co.scratch.broadcast 4223 co.scratch.broadcast -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/co.scratch.broadcast/app_DynamicOptDex/EACKTUZbZhAIueq.json 4223 co.scratch.broadcast -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId co.scratch.broadcast Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText co.scratch.broadcast Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId co.scratch.broadcast -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser co.scratch.broadcast -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock co.scratch.broadcast -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground co.scratch.broadcast -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.scratch.broadcast android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.scratch.broadcast android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.scratch.broadcast android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.scratch.broadcast android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.scratch.broadcast android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction co.scratch.broadcast -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone co.scratch.broadcast -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS co.scratch.broadcast -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver co.scratch.broadcast -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule co.scratch.broadcast -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo co.scratch.broadcast -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo co.scratch.broadcast
Processes
-
co.scratch.broadcast1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4223
Network
-
Remote address:1.1.1.1:53Requestandroid.apis.google.comIN AResponseandroid.apis.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A142.250.179.238
-
Remote address:1.1.1.1:53Requestjsonplaceholder.typicode.comIN AResponsejsonplaceholder.typicode.comIN A104.21.32.1jsonplaceholder.typicode.comIN A104.21.64.1jsonplaceholder.typicode.comIN A104.21.16.1jsonplaceholder.typicode.comIN A104.21.96.1jsonplaceholder.typicode.comIN A104.21.48.1jsonplaceholder.typicode.comIN A104.21.80.1jsonplaceholder.typicode.comIN A104.21.112.1
-
Remote address:104.21.32.1:443RequestPOST /posts HTTP/1.1
Content-Length: 15
Content-Type: application/x-www-form-urlencoded
User-Agent: Dalvik/2.1.0 (Linux; U; Android 9; Pixel 2 Build/PSR1.180720.122)
Host: jsonplaceholder.typicode.com
Connection: Keep-Alive
Accept-Encoding: gzip
ResponseHTTP/1.1 201 Created
Content-Type: application/json; charset=utf-8
Content-Length: 40
Connection: keep-alive
Report-To: {"group":"heroku-nel","max_age":3600,"endpoints":[{"url":"https://nel.heroku.com/reports?ts=1736633199&sid=e11707d5-02a7-43ef-b45e-2cf4d2036f7d&s=kF5iJqyuA3mRB688MngWN8ZYh%2BZd7uxInK%2FTeED1FMQ%3D"}]}
Reporting-Endpoints: heroku-nel=https://nel.heroku.com/reports?ts=1736633199&sid=e11707d5-02a7-43ef-b45e-2cf4d2036f7d&s=kF5iJqyuA3mRB688MngWN8ZYh%2BZd7uxInK%2FTeED1FMQ%3D
Nel: {"report_to":"heroku-nel","max_age":3600,"success_fraction":0.005,"failure_fraction":0.05,"response_headers":["Via"]}
X-Powered-By: Express
X-Ratelimit-Limit: 1000
X-Ratelimit-Remaining: 998
X-Ratelimit-Reset: 1736633209
Vary: Origin, X-HTTP-Method-Override, Accept-Encoding
Access-Control-Allow-Credentials: true
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Access-Control-Expose-Headers: Location
Location: https://jsonplaceholder.typicode.com/posts/101
X-Content-Type-Options: nosniff
Etag: W/"28-qTfHrE6INSRTzBnUDwZIeKeN1Wk"
Via: 1.1 vegur
cf-cache-status: DYNAMIC
Server: cloudflare
CF-RAY: 9008371a0ffdef44-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=31104&min_rtt=30979&rtt_var=6766&sent=6&recv=7&lost=0&retrans=0&sent_bytes=3298&recv_bytes=586&delivery_rate=129717&cwnd=253&unsent_bytes=0&cid=d84f1b6f4f87ca22&ts=209&x=0"
-
Remote address:1.1.1.1:53Requestkvq9t8pe7ssjps8p4iqj.xyzIN AResponse
-
Remote address:1.1.1.1:53Requestandroid.apis.google.comIN AResponseandroid.apis.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A142.250.178.14
-
915 B 40 B 1 1
-
915 B 40 B 1 1
-
1.1kB 4.5kB 9 7
-
8.6kB 40 B 4 1
-
1.1kB 5.3kB 9 9
HTTP Request
POST https://jsonplaceholder.typicode.com/postsHTTP Response
201 -
2.9kB 6.7kB 12 15
-
312 B 6
-
135 B 40 B 2 1
-
260 B 5
-
135 B 40 B 2 1
-
69 B 109 B 1 1
DNS Request
android.apis.google.com
DNS Response
142.250.179.238
-
3.7kB 11
-
74 B 186 B 1 1
DNS Request
jsonplaceholder.typicode.com
DNS Response
104.21.32.1104.21.64.1104.21.16.1104.21.96.1104.21.48.1104.21.80.1104.21.112.1
-
70 B 135 B 1 1
DNS Request
kvq9t8pe7ssjps8p4iqj.xyz
-
69 B 109 B 1 1
DNS Request
android.apis.google.com
DNS Response
142.250.178.14
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5a5b5805605352067c5660bf6a3789c96
SHA1e3bc838117bdacb7a91aa5dc87d8ab3c3a0ea77a
SHA256e59ac878d28ae377a4ab107d1aa41825e145914c319dcf089705dfb9f70906f8
SHA5129638ea3d58da3e8b435f129f4b380ae61e88a8d100b3afbf0747ebb2d4dfa97594cbdbca9e84a4dcd1adccd4aaff25bac8d8040780411914c8df33939a6e57e2
-
Filesize
696KB
MD5339acb29cc5daea7cb4386860c5fe2ef
SHA12222030cefea62954e726b0e4b58d0c69d681f10
SHA25699980467aa255b75ab06327e595133e252225995b4c13d65c6e29c18ae3b25ad
SHA5128fba0f44a751917543c70ecfc2ec27c7a4c71700c5aa335e252db044314df32338534ac7eb8d62a44f19563acd51e0cde4de6505820d6ec669dc056d9d132501
-
Filesize
466B
MD530aedfa5cb95bbe5ec7dc0b4acc07aac
SHA1274a92fc241363552550c613c58e86e1961faa46
SHA2564f82493d66774569c79ef671d85b06d854d5ce51841b66ca3a5736e29f2dc5c2
SHA5125ec46ca68267207c9f44dd7574ac20f2b4b4cedfe69a3fd68f58e89891c33801a9ed2b366b4ed516074e1795d408b31a0d63ab4a460384e8c25e191c2c73b658
-
Filesize
902KB
MD584ab3497e54dcf2a678229a376297e91
SHA1d7c1be14c186b0ea60689e61b9eb003c8bf5010c
SHA256ca37cef436bd5e63c5f988294550fba7f5b26f56e730a484d9042860176fd6f5
SHA5126fda7ffbe798f0fb8a05ac1eca3acb7937e3884cbf954d6d16174d0e64ae98431999d2ba04a1942dc87095f68c3a15ccb7296b78434fadc4994bdf5e4423ff2e