Analysis
-
max time kernel
149s -
max time network
155s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
11/02/2025, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
-
Size
2.2MB
-
MD5
badc4bd55edfaad5b9ee0a80f625ed22
-
SHA1
a2b9d606f8e4be2f05b9086d7a66bb3d6d907127
-
SHA256
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e
-
SHA512
cb25167aa1258b5ff8eb0da0bfdcaec60451ea23ef880755e7ba5cf95761245d831247631272dfd41d675b6e48a5c7398678ae52b7637f9ac8d0d0858b79e479
-
SSDEEP
49152:BdHPL8KJCXyAGkCDvGMgnih52eHDMOX8seIIrVM/vmgAtSBCOJhTs:vz8TXyAGkCD+nihtjMOssb+NYZhg
Malware Config
Extracted
cerberus
Extracted
alienbot
http://217.8.117.104
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 1 IoCs
resource yara_rule behavioral2/memory/5126-0.dex family_cerberus -
pid Process 5126 com.opvkhdin 5126 com.opvkhdin 5126 com.opvkhdin 5126 com.opvkhdin 5126 com.opvkhdin -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.opvkhdin/cache/payload.jar 5126 com.opvkhdin -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.opvkhdin Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.opvkhdin -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.opvkhdin -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.opvkhdin android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.opvkhdin -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.opvkhdin -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.opvkhdin
Processes
-
com.opvkhdin1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Performs UI accessibility actions on behalf of the user
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:5126
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370B
MD5498d2b7d3557d03dfc5543da53016c0b
SHA1398a2be80ae75487eefe35b854cbe2d242db0e0e
SHA25682770f7ed7505ad2ab8f60f2b932bd2ffd945c680245524773ec0176e8f9ca48
SHA5122e392a9c2191708613be3f5dcb622bda6045f14f6feccf47c5b150e9cbc9bd1ff69c6ee8e84f43f00ab0205897799f469009aca94031f9a24b705b1a41170fd8
-
Filesize
266KB
MD52f7df6ebe7d426fc6920781872085b71
SHA1c57fc7f43e75ce0c59f5f96b7a28b0fbe2e35fbf
SHA2563112b2284c817dbc860eb6b384453ea0c8baf290b66e1661cd6108d3023c9223
SHA5123b204dcf15f59a7d8b7eb469a1a995d5457822f37502d0279e773ea0c79c73d8ad5da63c5a63ebc09cd87768bbb8e84e5f9e6a2ebaf612caa62730aa586cfc47
-
Filesize
505KB
MD5c68813d8c9f135bc258f6a5669233ca5
SHA18b45381215ba1d22a5ce94a6e3239c2d641199fd
SHA25651a402f29aa476f9eaf1a057746d1a9ddd0dcced310c37f9b8f54b9eff11a0d3
SHA512fa4111ac8abd592f7daac329aa5c00e07d7a5af5a40618917e155b85993380ab26cd0750339d9925d62cc8cb07d0f89ea526cb6823b57d1f538f9b59d36342bd