Analysis
-
max time kernel
133s -
max time network
155s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
11/02/2025, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
-
Size
2.2MB
-
MD5
badc4bd55edfaad5b9ee0a80f625ed22
-
SHA1
a2b9d606f8e4be2f05b9086d7a66bb3d6d907127
-
SHA256
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e
-
SHA512
cb25167aa1258b5ff8eb0da0bfdcaec60451ea23ef880755e7ba5cf95761245d831247631272dfd41d675b6e48a5c7398678ae52b7637f9ac8d0d0858b79e479
-
SSDEEP
49152:BdHPL8KJCXyAGkCDvGMgnih52eHDMOX8seIIrVM/vmgAtSBCOJhTs:vz8TXyAGkCD+nihtjMOssb+NYZhg
Malware Config
Extracted
cerberus
Extracted
alienbot
http://217.8.117.104
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 2 IoCs
resource yara_rule behavioral1/memory/4356-0.dex family_cerberus behavioral1/memory/4332-0.dex family_cerberus -
pid Process 4332 com.opvkhdin -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.opvkhdin/cache/payload.jar 4356 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.opvkhdin/cache/payload.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.opvkhdin/cache/oat/x86/payload.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.opvkhdin/cache/payload.jar 4332 com.opvkhdin -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.opvkhdin Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.opvkhdin -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.opvkhdin -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.opvkhdin android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.opvkhdin -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.opvkhdin -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.opvkhdin -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.opvkhdin -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.opvkhdin -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.opvkhdin -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.opvkhdin
Processes
-
com.opvkhdin1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4332 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.opvkhdin/cache/payload.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.opvkhdin/cache/oat/x86/payload.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4356
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426B
MD574a5dabbf4252220d1d80f49e8b0a169
SHA12f4b90ca0fc672409c8f081497a476dc85a0058a
SHA2564b0dae1c58eaa82013a0f8d5d560570a8f8207bae5adcba5537243278d421e41
SHA5125d8f1d29621ddd4f991391fe4aac78d77ed5f9a4d86d4e12431fa27162dad4b48a2279ac811411c6d220e0649472af9bbd2ead8c925b1477cd90487a700278cd
-
Filesize
266KB
MD52f7df6ebe7d426fc6920781872085b71
SHA1c57fc7f43e75ce0c59f5f96b7a28b0fbe2e35fbf
SHA2563112b2284c817dbc860eb6b384453ea0c8baf290b66e1661cd6108d3023c9223
SHA5123b204dcf15f59a7d8b7eb469a1a995d5457822f37502d0279e773ea0c79c73d8ad5da63c5a63ebc09cd87768bbb8e84e5f9e6a2ebaf612caa62730aa586cfc47
-
Filesize
505KB
MD56b17c578b12e9f69c863cad3879e9df8
SHA1cbb8cd4daae00631eebe9533f54f4727d8b96a3b
SHA2567bd3409d4681003f95825ed2294ac30fb4812d555b1c129b3a1159f1d9dc398b
SHA512f16a892ef02a67ebdc1de8629dbd81a28131ff5a3b8996edf45d78970a26b92fe6367440919e514013d0b01c780739bd4b3e956b204b96db8066feee54efa65c
-
Filesize
505KB
MD5c68813d8c9f135bc258f6a5669233ca5
SHA18b45381215ba1d22a5ce94a6e3239c2d641199fd
SHA25651a402f29aa476f9eaf1a057746d1a9ddd0dcced310c37f9b8f54b9eff11a0d3
SHA512fa4111ac8abd592f7daac329aa5c00e07d7a5af5a40618917e155b85993380ab26cd0750339d9925d62cc8cb07d0f89ea526cb6823b57d1f538f9b59d36342bd