Analysis
-
max time kernel
136s -
max time network
131s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
17/01/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
02d023b0b09c8aa7cf7b8ebfb5b26d445fb859cf6597222da12b8dd0f0b8fe52.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
02d023b0b09c8aa7cf7b8ebfb5b26d445fb859cf6597222da12b8dd0f0b8fe52.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
02d023b0b09c8aa7cf7b8ebfb5b26d445fb859cf6597222da12b8dd0f0b8fe52.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
02d023b0b09c8aa7cf7b8ebfb5b26d445fb859cf6597222da12b8dd0f0b8fe52.apk
-
Size
1.4MB
-
MD5
1e7ab5f7d5410a6f7d74c6da22fea1bc
-
SHA1
d7427dce9e412706c862705ee792516027cb4d67
-
SHA256
02d023b0b09c8aa7cf7b8ebfb5b26d445fb859cf6597222da12b8dd0f0b8fe52
-
SHA512
7e1f7cdb66589a46f32847cd4a156df4115d030b120f5705539e56a26f312da2828ff5763fc075879abe0ae6545b354d703cdba8967157b6eb1aad35fc2f6f59
-
SSDEEP
24576:37UgswoNnuMsQJ2Ife3tyiNcftsWXYFQ2+5jXBqQqQfjAC2/iZwcOut:LYwwlToi+tyz+ioQ2edqQq2AC2aZnnt
Malware Config
Extracted
alienbot
http://hennesytamer.net/
Extracted
alienbot
http://hennesytamer.net/
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 1 IoCs
resource yara_rule behavioral3/memory/4492-0.dex family_cerberus -
pid Process 4492 com.owner.dad 4492 com.owner.dad 4492 com.owner.dad 4492 com.owner.dad 4492 com.owner.dad 4492 com.owner.dad 4492 com.owner.dad 4492 com.owner.dad -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.owner.dad/app_DynamicOptDex/mrMeJb.json 4492 com.owner.dad -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.owner.dad Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.owner.dad -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.owner.dad -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.owner.dad -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.owner.dad -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.owner.dad android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.owner.dad -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.owner.dad -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.owner.dad
Processes
-
com.owner.dad1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4492
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
238KB
MD5370a559d53f8470577fff1138475b811
SHA1f5193debf032091d12790726d1c8c746e1022360
SHA2566f312c0ebfe78a0be653e72d22849418704bfb791d980050bc5d567f70c84a1a
SHA512d264c549bb06686d29a0bc9ead0064894982d85cd6dc5d8438119ea29c7dcfccdf40accfca84c50013c8ddd93e1cc7f7348b8695f5b704e7bc1252cc5753000a
-
Filesize
238KB
MD57622f347582cc213cb5bdeaedf0e5c83
SHA18ff3cdf62cf0393c30a9cb0420143f43c68f097c
SHA256eb104932a0dcae35a582983bd3ecf1c49bf803379b2452be63316886cbf840fb
SHA512320447504f8802791daa20da3e2b8911907e663e1f15d6aa0548124f3ee913aac1f36f75b26f0b159b157d464ea7e7f737a0cd269b2c9d166614d565290203b7
-
Filesize
483KB
MD567bf10521e7831c1a3305b7da3966ed1
SHA1d49433c3a66f03f375f74879276c55ee7b97134d
SHA25687b7065edc1bcf23dd765c36fe357a712f4e6bb9fd8cb65441ce162e3180c396
SHA512ac46c939ef1d1ea855ebcc67d59f4c7dbce1abc0b89223dd2e35aebe5f9497620ffa96372a1925f14e580ac6ad5c478158422e135be84dd6fcba460d9115cd73
-
Filesize
319B
MD52540635b951d56e8ac78ecd88dfb636c
SHA15e49ee264c97db5c730b857d4a48ca480c046c90
SHA256be61b8ac964d5fbee641a352429d9cd6dca4303777775dcec9815e592b87c2c8
SHA512b53f84c63aaf62c49d6afa2f3c854a76a0959dbabdc6a2553c066b22ea1e27bccf75bae2a1dbd8aafeee28668678222f47b390f02ed88872f0611b642096c2b4