Analysis
-
max time kernel
139s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
26/03/2025, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
1cd7bab3a22cf44741925eb1ee5f969ccca01ff78ce6f3f010fdf6f93875c8fb.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
1cd7bab3a22cf44741925eb1ee5f969ccca01ff78ce6f3f010fdf6f93875c8fb.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
1cd7bab3a22cf44741925eb1ee5f969ccca01ff78ce6f3f010fdf6f93875c8fb.apk
-
Size
3.9MB
-
MD5
894fe2772e0dcacb289aec6c2e270309
-
SHA1
8e7dce465a012b44541f2d69706712dca633477a
-
SHA256
1cd7bab3a22cf44741925eb1ee5f969ccca01ff78ce6f3f010fdf6f93875c8fb
-
SHA512
71ce5ce44c6d9679aef9420552990e26ae634ad4c2ca293ce1c22002f794029c5253d3653f1114ca0e8d5eba7ad49517539c7bfd6e8a6e6e01061703ab3640cd
-
SSDEEP
98304:LXCg2SRsXt8VogpJ/teBDVq5rgpcBQY50QISGaGs:7qSRTpJ/teBamcBQvGX
Malware Config
Extracted
alienbot
http://a05qdzfe6qa1.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
pid Process 4266 array.exactly.principal 4266 array.exactly.principal 4266 array.exactly.principal 4266 array.exactly.principal -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model array.exactly.principal -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/array.exactly.principal/app_DynamicOptDex/zKbfVSpLFNfmizch.json 4291 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/array.exactly.principal/app_DynamicOptDex/zKbfVSpLFNfmizch.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/array.exactly.principal/app_DynamicOptDex/oat/x86/zKbfVSpLFNfmizch.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/array.exactly.principal/app_DynamicOptDex/zKbfVSpLFNfmizch.json 4266 array.exactly.principal -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId array.exactly.principal Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId array.exactly.principal Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText array.exactly.principal -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser array.exactly.principal -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock array.exactly.principal -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground array.exactly.principal -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction array.exactly.principal android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction array.exactly.principal android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction array.exactly.principal android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction array.exactly.principal -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone array.exactly.principal -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS array.exactly.principal -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver array.exactly.principal -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule array.exactly.principal -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo array.exactly.principal -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo array.exactly.principal
Processes
-
array.exactly.principal1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4266 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/array.exactly.principal/app_DynamicOptDex/zKbfVSpLFNfmizch.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/array.exactly.principal/app_DynamicOptDex/oat/x86/zKbfVSpLFNfmizch.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4291
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51c05634bd6c9f272ca502e48ab8dd5e1
SHA1249a2a01357bb0d6adb479e57aafcd9172a88ca8
SHA2569830189c1d60dab749612c043afae24f83ea57219749ed08e3565142caebf276
SHA512cfa8daabd252670e612068a9aa61bf807ff04c9dd2aba393fca2727be02251272ef56a387461f268e1aaeb967943206d05aa17a5b6ce3d62e8c0921007a2763d
-
Filesize
615KB
MD55ce8c4623446e306668c2d3c14b7c62f
SHA175e950acbcbb342cee2f0bc43c62914cd7b1d48c
SHA256d2830b404e81dbc8667ab4197fc9a26abc430a9a545731f9f62d20a1c53b3c6e
SHA512893dae058835583039d401c0fcaa5a06e6979be81b88f3a4c8e1226b84f403323b155123895ebba74678733ce3f480683d9317cd76f160d4f98189feaf03f7b1
-
Filesize
615KB
MD536edd5b3db169faac6d7b11a3d312e04
SHA1f8512065cce2c6c8a62f3996851f5cd269b2a4d7
SHA256ef9386cba288f9361f29e98aa65a5693ac173ec3c9e9302a42b51633f9ae0d84
SHA512b7debb958f715d02596b1a058b2f33ba7a882577f01ac2f120e54b909f13681f5f453320ecc391749476a12d59b5c6d61ca87c3b8b4db7643f12d9c45e52df12
-
Filesize
767KB
MD5fb02d62312b22b5c86d809a44d020b5d
SHA169cdc20d02f3d9f0d1422e2183131fe307d95b8d
SHA2562e04d58f3bda0c61b2b1151f4e8048a8ee004961b82e8eb2646e9cf250f1efec
SHA512e6ba6b4580bb8289ace931ea28ecec6dd06bb2ee078d9ff8fdee455491fcab2f36d8499aa9c6a8283c5debe8c88fe54f621ba7fc5d8dcbe1de5f2c3a90abef71
-
Filesize
767KB
MD5ea4fce81494ddec8ad274b38dc6a5a3c
SHA110a390348f9dca7b15d7a53312000e4307886f3f
SHA256e72f85d711a8c9047f5da25b9328b271128ddf64d92e0b168fbf7c2df835466e
SHA512807b318b9af02ed3d206fa0a285c9d1445f1d313cb3c48d055906edb25a1b2f8b65f047040dfe8fe5c01969413b4da8c190b2636478b75be73a7cca137f14bdb