Analysis
-
max time kernel
4079375s -
max time network
160s -
platform
android_x64 -
resource
android-x64 -
submitted
13-02-2022 12:50
Static task
static1
Behavioral task
behavioral1
Sample
a3a285cdfb69e2ba600df8cc9d028737e335d96d48b2083792f393010d59107e.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
a3a285cdfb69e2ba600df8cc9d028737e335d96d48b2083792f393010d59107e.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
a3a285cdfb69e2ba600df8cc9d028737e335d96d48b2083792f393010d59107e.apk
Resource
android-x64-arm64
General
-
Target
a3a285cdfb69e2ba600df8cc9d028737e335d96d48b2083792f393010d59107e.apk
-
Size
2.2MB
-
MD5
39392493077871e1e469432bb84039ad
-
SHA1
5d474edd1f501380c31b7bcbe00eb58617a3337e
-
SHA256
a3a285cdfb69e2ba600df8cc9d028737e335d96d48b2083792f393010d59107e
-
SHA512
a6aa5c3d60f3445c14e90be83448379f3659a7f6a6720dcf88d23efba4b945bc7ae23d3ea827a8e0d4ef59a206717b9e157fab67589c07d605270db6eae5572c
Malware Config
Extracted
alienbot
http://217.8.117.30
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Checks Qemu related system properties. 1 IoCs
Checks for Android system properties related to Qemu for Emulator detection.
Processes:
com.gvluzgxhbpcq.xktgujarlepodescription ioc Process Accessed system property key: qemu.gles com.gvluzgxhbpcq.xktgujarlepo -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.gvluzgxhbpcq.xktgujarlepoioc pid Process /data/user/0/com.gvluzgxhbpcq.xktgujarlepo/app_offline/yklwqoqpbt.jar 3812 com.gvluzgxhbpcq.xktgujarlepo
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2eb0adea0963df0bf7cd66321614e443
SHA1c3e3a298f04efdda9a6652be6ee5a3acbbb1ba67
SHA256b0ed6949ef8dcec22c7007de38ecb1a6d84a1c8f8fb8da9f2020373163363fae
SHA512c7996a61f3308ad1756e9e1cac321dd7a22a1bd275fb042cbb233105d57c1e30216eaf21a4891c105e05f305acbc5a889673b4c4be6b3857f0442afc960b708e