Analysis
-
max time kernel
2530901s -
max time network
191s -
platform
android_x64 -
resource
android-x64 -
submitted
07-12-2021 21:35
Static task
static1
Behavioral task
behavioral1
Sample
Aleyna_Tilki_Ifsa.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Aleyna_Tilki_Ifsa.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
Aleyna_Tilki_Ifsa.apk
-
Size
2.2MB
-
MD5
c2df5601485a33aa2feb1cb3b00e1bac
-
SHA1
3d1d4445e5daa4e88adca360e45da9277c60eb4d
-
SHA256
731c0da8d74adbb557a0abd4ec2aa6c61e09d429560d76549881f08e564b27cd
-
SHA512
7af0ca3260d826dee08e9a0097ab0cf2f05ad626751aa58815c37b03360b4a5d660cd86b87b4df58fbd4cf37058c0b5114de505248dc9aa35fd5a01f489380b1
Malware Config
Extracted
Family
cerberus
C2
http://31.187.74.114
Signatures
-
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Loads dropped Dex/Jar 5 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bulb.maid/app_DynamicOptDex/dMqSfxR.json 3695 com.bulb.maid /data/user/0/com.bulb.maid/app_DynamicOptDex/dMqSfxR.json 3695 com.bulb.maid /data/data/com.bulb.maid/app_apk/system.apk 3695 com.bulb.maid /data/data/com.bulb.maid/app_apk/system.apk 3695 com.bulb.maid /data/data/com.bulb.maid/app_apk/system.apk 3695 com.bulb.maid -
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation). 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.bulb.maid