Analysis
-
max time kernel
2484636s -
max time network
223s -
platform
android_x64 -
resource
android-x64 -
submitted
07-12-2021 08:52
Static task
static1
Behavioral task
behavioral1
Sample
bundle.apk
Resource
android-x64
General
-
Target
bundle.apk
-
Size
1.8MB
-
MD5
6365e05d01abc00295d40826ffec8388
-
SHA1
87723c64205336b8d13859ceeb3be672d7a1f51c
-
SHA256
c2ea0cee960e500ffb9d7bb46d5a2272765dcf9afd55e4e933232c8d33d85295
-
SHA512
14807dfc9425c36469825c9bb44cd5faf965d903bda756e3fb7f01b7fe75d52fb0120e8ad412a3e6ea8a824d1944904bcc15771f915ab138355794bd65f16d01
Malware Config
Extracted
alienbot
http://fiftiforfrisend.quest
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.fortune.symptomioc pid Process /data/user/0/com.fortune.symptom/app_DynamicOptDex/GaQsB.json 3681 com.fortune.symptom /data/user/0/com.fortune.symptom/app_DynamicOptDex/GaQsB.json 3681 com.fortune.symptom
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
34633f8f8f855f335853db502833d0ec
SHA1fd60108f6a2b74ec0b9bf4326a43d17f95e90636
SHA25695872f21fc31029bf699ef53804f4fa9f312f25728817c72a8867cdac84be307
SHA51282a7a0d063c501c25aa02a0062aa3639502d9e2cfae359e8513bb5590ce85fe2ad987408d14d03e75c15609d288b014f08f7e6b1874bdc75b272072f7c996c91
-
MD5
34633f8f8f855f335853db502833d0ec
SHA1fd60108f6a2b74ec0b9bf4326a43d17f95e90636
SHA25695872f21fc31029bf699ef53804f4fa9f312f25728817c72a8867cdac84be307
SHA51282a7a0d063c501c25aa02a0062aa3639502d9e2cfae359e8513bb5590ce85fe2ad987408d14d03e75c15609d288b014f08f7e6b1874bdc75b272072f7c996c91