Analysis
-
max time kernel
143s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
04-02-2025 22:08
Static task
static1
Behavioral task
behavioral1
Sample
a52d2105d680d029f9cc5c9c77f639e47ae520e41ce7294bbad77b8f2931796a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
a52d2105d680d029f9cc5c9c77f639e47ae520e41ce7294bbad77b8f2931796a.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
a52d2105d680d029f9cc5c9c77f639e47ae520e41ce7294bbad77b8f2931796a.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
a52d2105d680d029f9cc5c9c77f639e47ae520e41ce7294bbad77b8f2931796a.apk
-
Size
2.3MB
-
MD5
bcdb634ff9ab3e08e47dcf1caf89abd2
-
SHA1
213506113a6d73dcb8d632a85470688a682fb026
-
SHA256
a52d2105d680d029f9cc5c9c77f639e47ae520e41ce7294bbad77b8f2931796a
-
SHA512
42d2a75b8a6b056fc75011c9c717fdd9c38c255e953e8180631c096d4969ba1729b75ae750c64f8dca532890e95eff41241cdcb9b5790fc97f39e0c10959d522
-
SSDEEP
49152:fpZjJBuD3wv+ugforIlCNTbKOcsXtffdVpbhRW0zB:hRuDfunIImOcsxfdjW01
Malware Config
Extracted
alienbot
http://217.8.117.30
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 2 IoCs
resource yara_rule behavioral1/memory/4430-0.dex family_cerberus behavioral1/memory/4360-0.dex family_cerberus -
pid Process 4360 com.hmxuxgdngpi.bkqrlzkuwzuj -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.hmxuxgdngpi.bkqrlzkuwzuj/app_offline/oykpfzyxc.jar 4430 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.hmxuxgdngpi.bkqrlzkuwzuj/app_offline/oykpfzyxc.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.hmxuxgdngpi.bkqrlzkuwzuj/app_offline/oat/x86/oykpfzyxc.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.hmxuxgdngpi.bkqrlzkuwzuj/app_offline/oykpfzyxc.jar 4360 com.hmxuxgdngpi.bkqrlzkuwzuj -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.hmxuxgdngpi.bkqrlzkuwzuj Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.hmxuxgdngpi.bkqrlzkuwzuj -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.hmxuxgdngpi.bkqrlzkuwzuj -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.hmxuxgdngpi.bkqrlzkuwzuj android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.hmxuxgdngpi.bkqrlzkuwzuj -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.hmxuxgdngpi.bkqrlzkuwzuj -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.hmxuxgdngpi.bkqrlzkuwzuj -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.hmxuxgdngpi.bkqrlzkuwzuj -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.hmxuxgdngpi.bkqrlzkuwzuj -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.hmxuxgdngpi.bkqrlzkuwzuj -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.hmxuxgdngpi.bkqrlzkuwzuj
Processes
-
com.hmxuxgdngpi.bkqrlzkuwzuj1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4360 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.hmxuxgdngpi.bkqrlzkuwzuj/app_offline/oykpfzyxc.jar --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.hmxuxgdngpi.bkqrlzkuwzuj/app_offline/oat/x86/oykpfzyxc.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4430
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478B
MD5b2b5996260a7928d339887da3b56ba3a
SHA1d4ee1d366028403966d015d14aaf8d95cc2025fb
SHA2568aec0f74ba53869ae84ed311c12616e1049ef19b67d9a235490d1cdcb21f9065
SHA512a24227d01cda12d5665fb6bc303773818f77a22748432fedaaadcfb1d911190d3597e5590178f1008ee85f1f4e912f22e89484938e2013a47b52dc94f8b83fcb
-
Filesize
238KB
MD50e421b714166a1c5063d3fe243544d2e
SHA18ec5538657c10121296da904e7194428abdb0188
SHA256ba72f3124a5e164d0bf7e6e1442ec37958740eb4b9df5999c6becdbcb1cf26b2
SHA512f037a61829365507ec28b4c3583eb18c1bab7b8e291563c6143fc397aa187671b61169117ca76a30d107500b096691bc0ed61549ad2af136ea8d7cbb4ac6bb68
-
Filesize
475KB
MD56f55a264ddcdc33791b61e5a60e97f99
SHA1ca6c0bf960b420b7567f21c32a369124714508f2
SHA2561cd255d009b945dd801f083582cb16dc47ee5cce74f7c8c1c59d6f396694932f
SHA512c55becb791616e62b7699a50877217174fc4cb35f80304b002d9ec173cfa95e001cbc6a94d369e55b09ff6cec1637f2238bcff2c0687e1bb8f0e31952037bff0
-
Filesize
475KB
MD5f94b1751c1c9c48f53c18f69f03bcf47
SHA1a5f88e0e66c35567cc4ee061cbb00dd94b14bc17
SHA25646c4115efc12d7129de2a7b908698d20362e68e4dcb3a75a6565d0c1c9a9a997
SHA5121281546dc92ae8ca0591b7c5841084445e183f02da9ffc8233168e8b8d9701a87721e3bf3ada4effed5bdc3c15aeb111715c4d1c842fe9556328dc058bbf499b