Analysis

  • max time kernel
    3370834s
  • max time network
    177s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    05-02-2022 08:05

General

  • Target

    f2712d1ccadb309f2b482fd2f7118be4707423f8374dd9dfa56dcdda60819ad4.apk

  • Size

    1.2MB

  • MD5

    d0ee960194950078ba2ef14203557ccd

  • SHA1

    9fa0428cc7b57e9a6c5a110cd0e18a8e13790808

  • SHA256

    f2712d1ccadb309f2b482fd2f7118be4707423f8374dd9dfa56dcdda60819ad4

  • SHA512

    35c5b5155265bff2d03bd9cb4eb9ad365c23bc967dcafdd8f9b439738182908ad566098468ca0bb8442173d1ac7122624da07e110544a702715535c6a1b86451

Malware Config

Extracted

Family

alienbot

C2

http://xancc4fp.online

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • iawhmkptxbtiwoapxkxq.fsxdcqouxqgrqewwnpkuyxjsnsx.myaybhjxsrmfkzmbqomrhdhwqxg
    1⤵
    • Loads dropped Dex/Jar
    PID:5608

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/iawhmkptxbtiwoapxkxq.fsxdcqouxqgrqewwnpkuyxjsnsx.myaybhjxsrmfkzmbqomrhdhwqxg/app_DynamicOptDex/fyrLYM.json

    MD5

    4853fe10ce205a2c9e09cb588bbd2696

    SHA1

    1a8566d421c30bb7bd9feaa24223a266a1166889

    SHA256

    6aaf7c8dafd625c2e52e3028c8feeb538322e962229f84703891004b5edd4a5a

    SHA512

    bea270f94eb5d047668cee4df79a825905ddf9529e8859fe6f37e091a80e22f5eb179ea1ba5ce43ba7c4a5fa1a461ec52f84b128c5daff9616e6bbe81ea1376b

  • /data/user/0/iawhmkptxbtiwoapxkxq.fsxdcqouxqgrqewwnpkuyxjsnsx.myaybhjxsrmfkzmbqomrhdhwqxg/app_DynamicOptDex/fyrLYM.json

    MD5

    4853fe10ce205a2c9e09cb588bbd2696

    SHA1

    1a8566d421c30bb7bd9feaa24223a266a1166889

    SHA256

    6aaf7c8dafd625c2e52e3028c8feeb538322e962229f84703891004b5edd4a5a

    SHA512

    bea270f94eb5d047668cee4df79a825905ddf9529e8859fe6f37e091a80e22f5eb179ea1ba5ce43ba7c4a5fa1a461ec52f84b128c5daff9616e6bbe81ea1376b