Analysis
-
max time kernel
4079211s -
max time network
142s -
platform
android_x64 -
resource
android-x64 -
submitted
13-02-2022 12:49
Static task
static1
Behavioral task
behavioral1
Sample
df77910503d7fefae3915bb372455575e335b33e6a6f82f7cf8f5957c68daadb.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
df77910503d7fefae3915bb372455575e335b33e6a6f82f7cf8f5957c68daadb.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
df77910503d7fefae3915bb372455575e335b33e6a6f82f7cf8f5957c68daadb.apk
Resource
android-x64-arm64
General
-
Target
df77910503d7fefae3915bb372455575e335b33e6a6f82f7cf8f5957c68daadb.apk
-
Size
2.3MB
-
MD5
e747bf2176196039fe2d4c4554728a8f
-
SHA1
adc8aca22e30c546ee0efc6cbe2340ff2cc3329c
-
SHA256
df77910503d7fefae3915bb372455575e335b33e6a6f82f7cf8f5957c68daadb
-
SHA512
e0660af3b33062964137c568e589ef8a26147c0ca83eb40afd0e57e0f296fc0fe8c8dd5fdb66a5fe2eac8a5e40518f4da796721919829eee0611a46bccb6e68f
Malware Config
Extracted
alienbot
http://tifoumiz.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Checks Qemu related system properties. 1 IoCs
Checks for Android system properties related to Qemu for Emulator detection.
Processes:
aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisepdescription ioc Process Accessed system property key: qemu.gles aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisepioc pid Process /data/user/0/aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep/app_DynamicOptDex/SmJXMZo.json 3846 aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep /data/user/0/aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep/app_DynamicOptDex/SmJXMZo.json 3846 aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep
Processes
-
aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep1⤵
- Checks Qemu related system properties.
- Loads dropped Dex/Jar
PID:3846 -
aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep2⤵PID:3918
-
-
getprop2⤵PID:3918
-
-
aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep2⤵PID:3965
-
-
getprop2⤵PID:3965
-
-
aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep2⤵PID:4002
-
-
getprop2⤵PID:4002
-
-
aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep2⤵PID:4023
-
-
getprop2⤵PID:4023
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep/app_DynamicOptDex/SmJXMZo.json
MD5c602762d7c0114dcfdb95752b22bb926
SHA17439ccb5706b23ba66456096264777d311ad1b60
SHA256b5babbca89c0565bb4bfe32af80e998a28f39e40590221f7a8fdda104a517710
SHA512c56693c7b5a3a1695aaeab3493313628bf6e178353aac57131c3fb23a6394f95abdbbb7114a0c5c8fccf35df9b96089926d2bacbd21db39cf50b0f8bd330fa53
-
/data/user/0/aciewtjnxbkcdxzhoabso.yhsxudbuwodnudkkrda.frlxqjezpmuisep/app_DynamicOptDex/SmJXMZo.json
MD5c602762d7c0114dcfdb95752b22bb926
SHA17439ccb5706b23ba66456096264777d311ad1b60
SHA256b5babbca89c0565bb4bfe32af80e998a28f39e40590221f7a8fdda104a517710
SHA512c56693c7b5a3a1695aaeab3493313628bf6e178353aac57131c3fb23a6394f95abdbbb7114a0c5c8fccf35df9b96089926d2bacbd21db39cf50b0f8bd330fa53