Analysis
-
max time kernel
3871201s -
max time network
166s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
21-05-2022 12:22
Static task
static1
Behavioral task
behavioral1
Sample
e286a0b5913a538de6b6561c550d5d627cbc7389c77f365a43e6c0da03838e7c.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
e286a0b5913a538de6b6561c550d5d627cbc7389c77f365a43e6c0da03838e7c.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
e286a0b5913a538de6b6561c550d5d627cbc7389c77f365a43e6c0da03838e7c.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
e286a0b5913a538de6b6561c550d5d627cbc7389c77f365a43e6c0da03838e7c.apk
-
Size
2.0MB
-
MD5
a1905125d2be3cd838cbbcdab9be328a
-
SHA1
0b98ef4b256b606b23102224149dab2bab0b1100
-
SHA256
e286a0b5913a538de6b6561c550d5d627cbc7389c77f365a43e6c0da03838e7c
-
SHA512
508bd80bb5edfd7d7c42b2b4e4c65b15d10a5df78b900858cfb3dcfcb5d59a0c269fd3697f75c2dc5c5f44139d8fca181191e4b91dc1ba9ada63f118a0fedf19
Malware Config
Extracted
alienbot
http://coktanunuutuurduum.top
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
iustzp.azgfchjqpqykdqjwmgftdkx.ijpsriuobbniyzoioc pid Process /data/user/0/iustzp.azgfchjqpqykdqjwmgftdkx.ijpsriuobbniyzo/app_DynamicOptDex/DfwK.json 6031 iustzp.azgfchjqpqykdqjwmgftdkx.ijpsriuobbniyzo /data/user/0/iustzp.azgfchjqpqykdqjwmgftdkx.ijpsriuobbniyzo/app_DynamicOptDex/DfwK.json 6031 iustzp.azgfchjqpqykdqjwmgftdkx.ijpsriuobbniyzo
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
695KB
MD5df7cb1316f79dc44d4b0d4ec7a36b37e
SHA1414be23bce2362e48d99ea8d675e312ea203cf20
SHA2567a42076505d6b486278b3435c4fa3d637f3270416c9835118e5a362dc12f352e
SHA512842e7bc1b21b1b680cd87c7d16bdc960e92f31bcbb2c3b1e92073801e40b8974dd0143cfb1a9bd7ba47bef5471d84b095511cfffc875cb8c0c1463831707f9b0
-
Filesize
695KB
MD5207df91d7096ac793c36b891dd50accf
SHA1b47bf6906551abb9ca5887eebdc08c256379631a
SHA256953fde47d0f315d1602549508e4e126515c5629b96a30443eb7ef6391e2ebbbd
SHA512b759296f656103028cc5bb5780be6dc30ebc862930d8e56ac75e0a80cd9eb70efd232376a1cbd87392d6679130061c6f2c37095ea4c13c7a7b03afb98d7d40cc
-
Filesize
695KB
MD5207df91d7096ac793c36b891dd50accf
SHA1b47bf6906551abb9ca5887eebdc08c256379631a
SHA256953fde47d0f315d1602549508e4e126515c5629b96a30443eb7ef6391e2ebbbd
SHA512b759296f656103028cc5bb5780be6dc30ebc862930d8e56ac75e0a80cd9eb70efd232376a1cbd87392d6679130061c6f2c37095ea4c13c7a7b03afb98d7d40cc
-
/data/user/0/iustzp.azgfchjqpqykdqjwmgftdkx.ijpsriuobbniyzo/app_DynamicOptDex/oat/DfwK.json.cur.prof
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e