Analysis

  • max time kernel
    1279660s
  • max time network
    141s
  • platform
    android_x86_64
  • resource
    android-x86_64
  • submitted
    19-03-2021 20:53

General

  • Target

    96665e4a1638bec10375c4e402fbdbef6e7adee2849dcb5a15da4f9052391fde.apk

  • Size

    3.2MB

  • MD5

    e0ad7691ce2766e8023aafb2b7954350

  • SHA1

    87aa7b15fd5af3153486eb3b17f187da2da0e0ef

  • SHA256

    96665e4a1638bec10375c4e402fbdbef6e7adee2849dcb5a15da4f9052391fde

  • SHA512

    e39f563d76537d88b90ec4d91008e2cba05e11638ea52e87987acbbb8e58c4b54312062acc27687acd48904664ca8c241924c743a9f27e009a23198727b074cc

Malware Config

Extracted

Family

alienbot

C2

http://lgntsasasa.com

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Removes its main activity from the application launcher 5 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Tries to add a device administrator. 1 IoCs
  • Uses reflection 64 IoCs
  • 48 IoCs

Processes

  • afraid.move.pink
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Tries to add a device administrator.
    • Uses reflection
    PID:3610
    • afraid.move.pink
      2⤵
        PID:3664
      • getprop
        2⤵
          PID:3664
        • afraid.move.pink
          2⤵
            PID:3749
          • getprop
            2⤵
              PID:3749
            • afraid.move.pink
              2⤵
                PID:3788
              • getprop
                2⤵
                  PID:3788
                • afraid.move.pink
                  2⤵
                    PID:3833
                  • getprop
                    2⤵
                      PID:3833

                  Network

                  MITRE ATT&CK Matrix

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads