Analysis

  • max time kernel
    133s
  • max time network
    134s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    25/03/2025, 12:04

General

  • Target

    f808d05653ae38eef70954a583c9cacdf5d43bd28e73e689174d47c73e431da6.apk

  • Size

    2.6MB

  • MD5

    757be08495745e8f90e97d33fa946aff

  • SHA1

    0a7af3d293c4bc9fa142e714f5be6f774aa0a112

  • SHA256

    f808d05653ae38eef70954a583c9cacdf5d43bd28e73e689174d47c73e431da6

  • SHA512

    a49c67ea1f2b92f0bd30c699567198033c5e0712474d77674cbed3127429dfe2b5a208b6b35141c91d3eb3360a970992929a28887d38ed90cfd06177af5694a2

  • SSDEEP

    49152:dDFzDxnFGJvAMs5oC/kW2njHqN1EdJue2NV3zBDb32XIFtPWs3Sn:JFzDxnU+5HylepBfGXNj

Malware Config

Extracted

Family

alienbot

C2

http://194.163.136.78

rc4.plain

Extracted

Family

alienbot

C2

http://194.163.136.78

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Alienbot family
  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Cerberus family
  • Cerberus payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • video.typical.scrap
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries account information for other applications stored on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Checks CPU information
    • Checks memory information
    PID:4374
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/video.typical.scrap/app_DynamicOptDex/jZ.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/video.typical.scrap/app_DynamicOptDex/oat/x86/jZ.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4398

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/video.typical.scrap/app_DynamicOptDex/jZ.json

    Filesize

    695KB

    MD5

    99ca162c256d1f74e74580a3110a05c3

    SHA1

    5626499829471270feac4413bfb807eb3a71bbce

    SHA256

    f2f00291c5dc5c33697dbaa02239985ab8d060687445f67c158ff62786793e4b

    SHA512

    c8791671cd895556c72fb7eb47001326c115133486191c38c8d97295f30f70d498ccaabe3b4f7270234bad4c434842b77ca715a04173408d56ab9b562cf113eb

  • /data/data/video.typical.scrap/app_DynamicOptDex/jZ.json

    Filesize

    695KB

    MD5

    33f1dd56e54c4dcb29c2bcf0aa11bd86

    SHA1

    349040d578a550a758c8d6cae15f9a0e2d525f43

    SHA256

    d6ecf45bf1f6b71cc285cba4b477f891552ce3b1e2d75c3713e663164ae43729

    SHA512

    2a0a2e785a8c48eff88ec5b2106f8481c5ff10d13d15fb7bf381d8f1952cdc37c2c4e8af095ad018bdaf89da18f2d07e03073c5a4e1019626297431ad57fbbb4

  • /data/data/video.typical.scrap/app_DynamicOptDex/oat/jZ.json.cur.prof

    Filesize

    287B

    MD5

    0c2279b94ea1358ab20eab0c3dc65c1c

    SHA1

    2a7c08e7fa5272964f2d0966ff5aaad112448480

    SHA256

    e11afb75036751a079066dd3b0f05a4ff1c791eca77b92b0cd52608e74c251bc

    SHA512

    a9c5b03de7716ece01fb6c5ceb105b9d7a5b686967919280bd1166a0e1d79535ab00c5b589ff23265efb501f19120605674ebbb01e49b12fd119eb228e5ad780

  • /data/data/video.typical.scrap/app_DynamicOptDex/oat/jZ.json.cur.prof

    Filesize

    541B

    MD5

    20d31699b78ab8b1ffde2726efbfc0a0

    SHA1

    396f832a960869fef2c537c63bea07e52658ee45

    SHA256

    4f54793be25c6986d2b1b966d50ca64798e534cac3afefac16d01612244ba2db

    SHA512

    47aeb6227acec90ce89fac7f15c42851b1fe1e51b1751d662afa6fdf0f2632b1359fde21238294c1e5e8ce08e3a5fc13579107ac551d4423f86cc036abbe7b28

  • /data/user/0/video.typical.scrap/app_DynamicOptDex/jZ.json

    Filesize

    695KB

    MD5

    895c0d1c6e1afda80de0e1ab58352ab1

    SHA1

    ea56923edaf4e33af4f36ad6f6d4dd8ac7937689

    SHA256

    5a1a0d0b74acfa9287482af5dfee607dbad45a92c441e1861f311d3bf16252a7

    SHA512

    29b2d34d88cb8215884705bca0a7b3ca7574a4755fba767edff9c4f172257f35bcf2c1d2f56b0a73b2b77a97160c498fbea4a7eab897477ff299f42a251691c0