Analysis

  • max time kernel
    3982895s
  • max time network
    144s
  • platform
    android_x86
  • resource
    android-x86_arm
  • submitted
    22-11-2020 00:39

General

  • Target

    AndroidUpdate.apk

  • Size

    2.3MB

  • MD5

    570d868aca95df74b7e3a2b8005cda2b

  • SHA1

    fe3b0d48e0d75e70eeb546448fb25e52e4ab6cff

  • SHA256

    b1908d38e44242eece0cc1d11e51cf482400977f110d8210ff9c12d7365af743

  • SHA512

    82f2b3f82e440b8b6c7f9335d98a9a4a169ee934233d43d94f28ae2a872d55daf26ff8ada6ea67a3db0ecd8edbd452595a815aca44caf2d1060a1b9e52915b2c

Malware Config

Extracted

Family

alienbot

C2

http://bestof12beach.xyz

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Tries to add a device administrator. 1 IoCs
  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Suspicious use of android.app.ActivityManager.getRunningServices 38 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 8 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getNetworkCountryIso 2 IoCs
  • Uses reflection 87 IoCs

Processes

  • arrest.brush.lounge
    1⤵
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Tries to add a device administrator.
    • Reads name of network operator
    • Suspicious use of android.app.ActivityManager.getRunningServices
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Suspicious use of android.telephony.TelephonyManager.getNetworkCountryIso
    • Uses reflection
    PID:4552
    • arrest.brush.lounge
      2⤵
        PID:4682
      • /system/bin/dex2oat
        2⤵
        • Loads dropped Dex/Jar
        PID:4682

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads