Analysis
-
max time kernel
139s -
max time network
150s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
26/03/2025, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
1cd7bab3a22cf44741925eb1ee5f969ccca01ff78ce6f3f010fdf6f93875c8fb.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
1cd7bab3a22cf44741925eb1ee5f969ccca01ff78ce6f3f010fdf6f93875c8fb.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
1cd7bab3a22cf44741925eb1ee5f969ccca01ff78ce6f3f010fdf6f93875c8fb.apk
-
Size
3.9MB
-
MD5
894fe2772e0dcacb289aec6c2e270309
-
SHA1
8e7dce465a012b44541f2d69706712dca633477a
-
SHA256
1cd7bab3a22cf44741925eb1ee5f969ccca01ff78ce6f3f010fdf6f93875c8fb
-
SHA512
71ce5ce44c6d9679aef9420552990e26ae634ad4c2ca293ce1c22002f794029c5253d3653f1114ca0e8d5eba7ad49517539c7bfd6e8a6e6e01061703ab3640cd
-
SSDEEP
98304:LXCg2SRsXt8VogpJ/teBDVq5rgpcBQY50QISGaGs:7qSRTpJ/teBamcBQvGX
Malware Config
Extracted
alienbot
http://a05qdzfe6qa1.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/array.exactly.principal/app_DynamicOptDex/zKbfVSpLFNfmizch.json 4446 array.exactly.principal -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId array.exactly.principal Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId array.exactly.principal Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText array.exactly.principal -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser array.exactly.principal -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock array.exactly.principal -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground array.exactly.principal -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction array.exactly.principal android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction array.exactly.principal android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction array.exactly.principal android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction array.exactly.principal -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS array.exactly.principal -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule array.exactly.principal
Processes
-
array.exactly.principal1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4446
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
330B
MD528a86e3cb0f97837e3040b2304789d45
SHA1dd8706eb8ef31dd502af1ffe493a3b3d1c7f5f50
SHA25674b0b610909551af8f19236510fdf616b25422638a9e0e9b8330faa4838ec49e
SHA512acad2899aa548302234fdccdcc8f508437dd26faa21ece72a33f9f99371df90fe06d57e53132198584e2e5da138d517b4c193408901009d82530af2718e63eca
-
Filesize
615KB
MD55ce8c4623446e306668c2d3c14b7c62f
SHA175e950acbcbb342cee2f0bc43c62914cd7b1d48c
SHA256d2830b404e81dbc8667ab4197fc9a26abc430a9a545731f9f62d20a1c53b3c6e
SHA512893dae058835583039d401c0fcaa5a06e6979be81b88f3a4c8e1226b84f403323b155123895ebba74678733ce3f480683d9317cd76f160d4f98189feaf03f7b1
-
Filesize
615KB
MD536edd5b3db169faac6d7b11a3d312e04
SHA1f8512065cce2c6c8a62f3996851f5cd269b2a4d7
SHA256ef9386cba288f9361f29e98aa65a5693ac173ec3c9e9302a42b51633f9ae0d84
SHA512b7debb958f715d02596b1a058b2f33ba7a882577f01ac2f120e54b909f13681f5f453320ecc391749476a12d59b5c6d61ca87c3b8b4db7643f12d9c45e52df12
-
Filesize
767KB
MD5ea4fce81494ddec8ad274b38dc6a5a3c
SHA110a390348f9dca7b15d7a53312000e4307886f3f
SHA256e72f85d711a8c9047f5da25b9328b271128ddf64d92e0b168fbf7c2df835466e
SHA512807b318b9af02ed3d206fa0a285c9d1445f1d313cb3c48d055906edb25a1b2f8b65f047040dfe8fe5c01969413b4da8c190b2636478b75be73a7cca137f14bdb