Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
27/03/2025, 14:29
Behavioral task
behavioral1
Sample
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad.apk
-
Size
311KB
-
MD5
c86f20dc93c1d5427ae149ce89e764d2
-
SHA1
c0f961ba8df77cfe6848b6679b94f398bf2e5053
-
SHA256
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad
-
SHA512
d8a283b5a5225ddfac96c1be5c21ea90b32df70d5639392c8afbc20d675f838459fe0aa428baf7db7b44beab28006df8801d700190351ae28b12e738acc588aa
-
SSDEEP
6144:x19xxvzXZYfrhtyjHpj1V6HGdVDse3U0ls6yiAZ4oFT8A9K9LhRFYwbOh4hZm:Rxxv5jHRSmdJse3UiBgTR9K9LnFYwb8/
Malware Config
Extracted
alienbot
http://abindizzobremin.tk
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
pid Process 4227 com.hgukldiuhpjpjjnf.xgxiqavgnnxpz -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.hgukldiuhpjpjjnf.xgxiqavgnnxpz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.hgukldiuhpjpjjnf.xgxiqavgnnxpz -
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.hgukldiuhpjpjjnf.xgxiqavgnnxpz -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.hgukldiuhpjpjjnf.xgxiqavgnnxpz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.hgukldiuhpjpjjnf.xgxiqavgnnxpz -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.hgukldiuhpjpjjnf.xgxiqavgnnxpz -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.hgukldiuhpjpjjnf.xgxiqavgnnxpz -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.hgukldiuhpjpjjnf.xgxiqavgnnxpz -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.hgukldiuhpjpjjnf.xgxiqavgnnxpz
Processes
-
com.hgukldiuhpjpjjnf.xgxiqavgnnxpz1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4227
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1