Analysis
-
max time kernel
3018561s -
max time network
147s -
platform
android_x86 -
resource
android-x86-arm -
submitted
01-02-2022 06:11
Static task
static1
Behavioral task
behavioral1
Sample
604b3cd50ef3b0df46bcb07a1d2d0fad31f517f4ef541036d9f0161d3c69499b.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
604b3cd50ef3b0df46bcb07a1d2d0fad31f517f4ef541036d9f0161d3c69499b.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
604b3cd50ef3b0df46bcb07a1d2d0fad31f517f4ef541036d9f0161d3c69499b.apk
Resource
android-x64-arm64
General
-
Target
604b3cd50ef3b0df46bcb07a1d2d0fad31f517f4ef541036d9f0161d3c69499b.apk
-
Size
1.4MB
-
MD5
965250dc9f6afd4b419091813d4fd585
-
SHA1
9c58d32eaa79c85644f9a50c56f8cacadb09e8b4
-
SHA256
604b3cd50ef3b0df46bcb07a1d2d0fad31f517f4ef541036d9f0161d3c69499b
-
SHA512
430129ba9e6b4ea919fbadc996b12a6a0e3b05786904688e7e5597789c880a86b67642cf35bccf65b75875ce6c9f4db1ec6c04b2143574964298a528a035edd4
Malware Config
Extracted
alienbot
http://ahf4ycvea439tt9rq.site
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Makes use of the framework's Accessibility service. 1 IoCs
Processes:
xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyddescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyd -
Acquires the wake lock. 1 IoCs
Processes:
xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyddescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyd -
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyd/system/bin/dex2oatioc pid Process /data/user/0/xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyd/app_DynamicOptDex/gNGn.json 5034 xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyd /data/user/0/xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyd/app_DynamicOptDex/gNGn.json 5090 /system/bin/dex2oat /data/user/0/xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyd/app_DynamicOptDex/gNGn.json 5034 xkqmtyq.jhsgjwojcncbmtlsk.xlkbczbjwuanyd
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8fb2c3ed543489ef2465e267b7e975ea
SHA15c4c7828ef69e217bff85e1fd01dbd137fdddd2f
SHA2564c7a594cb2f1bff308ba90ebe468bd77361ef9183573536b1fe10c0e5f9b36c4
SHA51234e2eee0ebfcb1b4693226d22f2bcca3128769d710973e75b36ea63a2c874aeef1bf0f58534b46aacf2de57bd5bd4d6c52efc8607ed58bb21cd9fb98e9fae17f
-
MD5
934588bd836312e511d416980aac9af4
SHA165cb17a01a2bdf8bdd801f49869fcb5d72b2cdc5
SHA256e1a1b88da0bb626bc4b9a09dd48a0670d68f114629aae44b5a2fb0f81f4d456a
SHA512e9ec0b54cff2c676c6f3cde202a5f0bede582200a0314b473034866f61ddcb9edae633fe2d056cb39e97c8e6227b14baa91dc2283ed6e96cc64d0aeabd4b8263
-
MD5
8fb2c3ed543489ef2465e267b7e975ea
SHA15c4c7828ef69e217bff85e1fd01dbd137fdddd2f
SHA2564c7a594cb2f1bff308ba90ebe468bd77361ef9183573536b1fe10c0e5f9b36c4
SHA51234e2eee0ebfcb1b4693226d22f2bcca3128769d710973e75b36ea63a2c874aeef1bf0f58534b46aacf2de57bd5bd4d6c52efc8607ed58bb21cd9fb98e9fae17f