Analysis

  • max time kernel
    4079375s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    13-02-2022 12:50

General

  • Target

    a3a285cdfb69e2ba600df8cc9d028737e335d96d48b2083792f393010d59107e.apk

  • Size

    2.2MB

  • MD5

    39392493077871e1e469432bb84039ad

  • SHA1

    5d474edd1f501380c31b7bcbe00eb58617a3337e

  • SHA256

    a3a285cdfb69e2ba600df8cc9d028737e335d96d48b2083792f393010d59107e

  • SHA512

    a6aa5c3d60f3445c14e90be83448379f3659a7f6a6720dcf88d23efba4b945bc7ae23d3ea827a8e0d4ef59a206717b9e157fab67589c07d605270db6eae5572c

Malware Config

Extracted

Family

alienbot

C2

http://217.8.117.30

Signatures

  • Alienbot

    Alienbot is a fork of Cerberus banker first seen in January 2020.

  • Checks Qemu related system properties. 1 IoCs

    Checks for Android system properties related to Qemu for Emulator detection.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.gvluzgxhbpcq.xktgujarlepo
    1⤵
    • Checks Qemu related system properties.
    • Loads dropped Dex/Jar
    PID:3812
    • com.gvluzgxhbpcq.xktgujarlepo
      2⤵
        PID:3870
      • getprop
        2⤵
          PID:3870
        • com.gvluzgxhbpcq.xktgujarlepo
          2⤵
            PID:3941
          • getprop
            2⤵
              PID:3941

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • /data/user/0/com.gvluzgxhbpcq.xktgujarlepo/app_offline/yklwqoqpbt.jar

            MD5

            2eb0adea0963df0bf7cd66321614e443

            SHA1

            c3e3a298f04efdda9a6652be6ee5a3acbbb1ba67

            SHA256

            b0ed6949ef8dcec22c7007de38ecb1a6d84a1c8f8fb8da9f2020373163363fae

            SHA512

            c7996a61f3308ad1756e9e1cac321dd7a22a1bd275fb042cbb233105d57c1e30216eaf21a4891c105e05f305acbc5a889673b4c4be6b3857f0442afc960b708e