Analysis

  • max time kernel
    2484636s
  • max time network
    223s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    07-12-2021 08:52

General

  • Target

    bundle.apk

  • Size

    1.8MB

  • MD5

    6365e05d01abc00295d40826ffec8388

  • SHA1

    87723c64205336b8d13859ceeb3be672d7a1f51c

  • SHA256

    c2ea0cee960e500ffb9d7bb46d5a2272765dcf9afd55e4e933232c8d33d85295

  • SHA512

    14807dfc9425c36469825c9bb44cd5faf965d903bda756e3fb7f01b7fe75d52fb0120e8ad412a3e6ea8a824d1944904bcc15771f915ab138355794bd65f16d01

Malware Config

Extracted

Family

alienbot

C2

http://fiftiforfrisend.quest

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.fortune.symptom
    1⤵
    • Loads dropped Dex/Jar
    PID:3681
    • com.fortune.symptom
      2⤵
        PID:3755

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /data/user/0/com.fortune.symptom/app_DynamicOptDex/GaQsB.json

      MD5

      34633f8f8f855f335853db502833d0ec

      SHA1

      fd60108f6a2b74ec0b9bf4326a43d17f95e90636

      SHA256

      95872f21fc31029bf699ef53804f4fa9f312f25728817c72a8867cdac84be307

      SHA512

      82a7a0d063c501c25aa02a0062aa3639502d9e2cfae359e8513bb5590ce85fe2ad987408d14d03e75c15609d288b014f08f7e6b1874bdc75b272072f7c996c91

    • /data/user/0/com.fortune.symptom/app_DynamicOptDex/GaQsB.json

      MD5

      34633f8f8f855f335853db502833d0ec

      SHA1

      fd60108f6a2b74ec0b9bf4326a43d17f95e90636

      SHA256

      95872f21fc31029bf699ef53804f4fa9f312f25728817c72a8867cdac84be307

      SHA512

      82a7a0d063c501c25aa02a0062aa3639502d9e2cfae359e8513bb5590ce85fe2ad987408d14d03e75c15609d288b014f08f7e6b1874bdc75b272072f7c996c91