Analysis
-
max time kernel
149s -
max time network
155s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
11/02/2025, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e.apk
-
Size
2.2MB
-
MD5
badc4bd55edfaad5b9ee0a80f625ed22
-
SHA1
a2b9d606f8e4be2f05b9086d7a66bb3d6d907127
-
SHA256
da6f2b53a55368f43295bc54395ba923c0c46c098e2f3884844aaae64e571d8e
-
SHA512
cb25167aa1258b5ff8eb0da0bfdcaec60451ea23ef880755e7ba5cf95761245d831247631272dfd41d675b6e48a5c7398678ae52b7637f9ac8d0d0858b79e479
-
SSDEEP
49152:BdHPL8KJCXyAGkCDvGMgnih52eHDMOX8seIIrVM/vmgAtSBCOJhTs:vz8TXyAGkCD+nihtjMOssb+NYZhg
Malware Config
Extracted
cerberus
Extracted
alienbot
http://217.8.117.104
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload 1 IoCs
resource yara_rule behavioral3/memory/4597-0.dex family_cerberus -
pid Process 4597 com.opvkhdin 4597 com.opvkhdin 4597 com.opvkhdin 4597 com.opvkhdin 4597 com.opvkhdin 4597 com.opvkhdin 4597 com.opvkhdin -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.opvkhdin/cache/payload.jar 4597 com.opvkhdin -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.opvkhdin Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.opvkhdin -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.opvkhdin -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.opvkhdin android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.opvkhdin -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.opvkhdin -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.opvkhdin
Processes
-
com.opvkhdin1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4597
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315B
MD5557cbbe312adb21eae11157c45bc19be
SHA172cbea65d3e02afc36d67979b1df4b28979eb9de
SHA2566595b2cc5885c6f055ef763206e1e58937e7cbf556b4c0ed2e348979effb0414
SHA51240bfcb1ccb713fa82699db5db62a51ccbeca6eca93f2d541c625f476d0f0c7a91a95a681fce0e69b5f4bf96dff800b8127dab888413e7a71130ddca69ec73d09
-
Filesize
266KB
MD52f7df6ebe7d426fc6920781872085b71
SHA1c57fc7f43e75ce0c59f5f96b7a28b0fbe2e35fbf
SHA2563112b2284c817dbc860eb6b384453ea0c8baf290b66e1661cd6108d3023c9223
SHA5123b204dcf15f59a7d8b7eb469a1a995d5457822f37502d0279e773ea0c79c73d8ad5da63c5a63ebc09cd87768bbb8e84e5f9e6a2ebaf612caa62730aa586cfc47
-
Filesize
505KB
MD5c68813d8c9f135bc258f6a5669233ca5
SHA18b45381215ba1d22a5ce94a6e3239c2d641199fd
SHA25651a402f29aa476f9eaf1a057746d1a9ddd0dcced310c37f9b8f54b9eff11a0d3
SHA512fa4111ac8abd592f7daac329aa5c00e07d7a5af5a40618917e155b85993380ab26cd0750339d9925d62cc8cb07d0f89ea526cb6823b57d1f538f9b59d36342bd