Analysis

  • max time kernel
    1407631s
  • max time network
    186s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    17-08-2021 11:36

General

  • Target

    9097f2c241be72a64a0ceab6e4de074d0314cf7661ec04ef3dcaa7b99407aa0a.apk

  • Size

    3.1MB

  • MD5

    f63eb8e447e0fec2b226d7c0e04b8052

  • SHA1

    545d06d33fb5be58e2e74a28794d3a5251244162

  • SHA256

    9097f2c241be72a64a0ceab6e4de074d0314cf7661ec04ef3dcaa7b99407aa0a

  • SHA512

    064d56ef45a8e6ed0635d2826b8510b268dcd67c0a97d5f5bb09bd8bfbd6189b750201112ab30f95537adb0e1b17f78dcb82bda14eba18f7ff0f39ebc497faa4

Malware Config

Extracted

Family

alienbot

C2

http://sillldkisteaqq.com

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses reflection 20 IoCs

Processes

  • pulse.puzzle.victory
    1⤵
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses reflection
    PID:3605

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads