Analysis
-
max time kernel
142s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
14-01-2025 22:07
Static task
static1
Behavioral task
behavioral1
Sample
20bf0d3262150730fdf6869243e6bdf19feda0c15d0d09b6611f57075fed6b0b.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
20bf0d3262150730fdf6869243e6bdf19feda0c15d0d09b6611f57075fed6b0b.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
20bf0d3262150730fdf6869243e6bdf19feda0c15d0d09b6611f57075fed6b0b.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
20bf0d3262150730fdf6869243e6bdf19feda0c15d0d09b6611f57075fed6b0b.apk
-
Size
1.4MB
-
MD5
a215f520a027c6d8896862e28fb4bcb8
-
SHA1
827df4030fe8ca6aebb038727c4348a50cc9566f
-
SHA256
20bf0d3262150730fdf6869243e6bdf19feda0c15d0d09b6611f57075fed6b0b
-
SHA512
b5aabcd5280c7ce13d3155d8661cc871cce06ffbaa4c1920f9043f385f762553b3347225f3ec78dd196c62794a1268558f3fd101393d14547b1256d8805b33a0
-
SSDEEP
24576:HsZs6jT0x4AytNk8RmYjX/Tq6v9yJuRrtTt+1O5lXi2Si/dgRtLKeN+0:Hsq6jTC4AytV8YjvTtv9yJuRp5+1OXih
Malware Config
Extracted
alienbot
https://hosgeldin2023.com
Extracted
alienbot
https://hosgeldin2023.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 2 IoCs
resource yara_rule behavioral1/memory/4365-0.dex family_cerberus behavioral1/memory/4340-0.dex family_cerberus -
pid Process 4340 com.later.gaze -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.later.gaze -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.later.gaze/app_DynamicOptDex/hTmUMU.json 4365 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.later.gaze/app_DynamicOptDex/hTmUMU.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.later.gaze/app_DynamicOptDex/oat/x86/hTmUMU.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.later.gaze/app_DynamicOptDex/hTmUMU.json 4340 com.later.gaze -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.later.gaze Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.later.gaze -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.later.gaze -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.later.gaze -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.later.gaze -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.later.gaze android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.later.gaze -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.later.gaze -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.later.gaze -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.later.gaze -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.later.gaze -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.later.gaze -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.later.gaze
Processes
-
com.later.gaze1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4340 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.later.gaze/app_DynamicOptDex/hTmUMU.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.later.gaze/app_DynamicOptDex/oat/x86/hTmUMU.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4365
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD59d24bf25aa3efb28357a2fbc95d1fd59
SHA15844fc73e8db6223ba78db30fe57da80eed37f8e
SHA256e54e0e3302239e1af4978940ffc33f8f2d295b55efca756de48bd5d7168de7b1
SHA512ab81a44b7481987515d56ffecd888c35236fb5addd7f2ed14619cd03538d220275a4beca34f836f41eaa2f678f254e2fa32ed70879fbd11704466342c6c1f0a7
-
Filesize
238KB
MD5aa6b07098357450e722fb755133d7147
SHA114eabec23fc941fc77365e5f452f58e0791ba45c
SHA2564147b6a93680470d8686159af6fcc920b57117a324b838e47a28a1896e3f3729
SHA5126b78655cf806201dba55a695bf3745231ab0d30869b138ca7b9e43b45686c80512800b15d0bfab16876143c65450018dd5b9b42e505bb9fee4d6cf1414477190
-
Filesize
490B
MD5878820c47e2d16695fc01ff9de32470f
SHA19bef525f7ccf38256be4375832f59f67ab6daa0b
SHA256a8390fc0e4585f68c7a43fb5922c4ad9a699f3ae762e03895b332208ec5b6d67
SHA512aa810a97e12c042d2a2485a122978b3bfb38cb24842a9b579ef7e9e8d0895984a490e65f39371e0e2ef6aef2bff50171d96582139c7135820d58daed0d01b3cd
-
Filesize
483KB
MD57bc904ee99310cbca8217f5aed950510
SHA14b203a9ed0c0f96eafbf8befa8ed10cc11689615
SHA256d2027c54b9cddd6f5f20df3a513f032d17a6475bb826bd36f0c30953d0649efb
SHA5128302e556001917414d43391cdc23e37571aba5a5c96728dc3a3e58af997165efb4065ad20eec4344b0cabad1d4f8d73bb9c85ed383f65ffae537b00ab8834bae
-
Filesize
483KB
MD5310d174a08f6df51307a6a2a05a1321c
SHA1e262caf64a460d4e5e46a9eb09e5f26d70ec8162
SHA256e5377f5bfda35377b2ceb723539f4b1e78f0765cfd6f06cdedb54b770ab54ed7
SHA5124b5044e26aa75a4757ee17958fce14d09e9437a0cc9cbda920e15f23a3d61c4b0f0fe84386792fbfb77a8c6940866d80c0a4ff55952c62f2d076a5cdf3dacee1