Analysis
-
max time kernel
4146896s -
max time network
162s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
24-05-2022 16:51
Static task
static1
Behavioral task
behavioral1
Sample
a82289b97d4d7fd36a93c7400252aa3f82201af9a6eb7ed4066e3cff283859c9.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
a82289b97d4d7fd36a93c7400252aa3f82201af9a6eb7ed4066e3cff283859c9.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
a82289b97d4d7fd36a93c7400252aa3f82201af9a6eb7ed4066e3cff283859c9.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
a82289b97d4d7fd36a93c7400252aa3f82201af9a6eb7ed4066e3cff283859c9.apk
-
Size
1.8MB
-
MD5
308cf755d3432fea0483e98a2a196fd7
-
SHA1
2dd61d6abd223731dd79b90f02ddadf534f9fe70
-
SHA256
a82289b97d4d7fd36a93c7400252aa3f82201af9a6eb7ed4066e3cff283859c9
-
SHA512
e0063de50ec1b516b94ea40034f79b6f848908f335bac416caffde884dda09a4dd4843a7348640b07e34bd9cb1a65cebe22531ee7ac37b1dbdd3a4592f23bbcb
Malware Config
Extracted
alienbot
http://aladinmaladingo.xyz
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqjioc pid Process /data/user/0/yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqj/app_DynamicOptDex/esp.json 6331 yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqj /data/user/0/yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqj/app_DynamicOptDex/esp.json 6331 yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqj
Processes
-
yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqj1⤵
- Loads dropped Dex/Jar
PID:6331 -
getprop ro.miui.ui.version.name2⤵PID:6460
-
-
getprop ro.miui.ui.version.name2⤵PID:6553
-
-
getprop ro.miui.ui.version.name2⤵PID:6600
-
-
getprop ro.miui.ui.version.name2⤵PID:6636
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqj/app_DynamicOptDex/esp.json
Filesize658KB
MD52afbb14eec0b4a8893bb841ca57f5f80
SHA19e30182c0e5a5eb13190598162494b105fb54331
SHA256993099f4a7556705f8e47fa07078feee9936a2a7323283437a267366bafff401
SHA51229bb00c8410cc0d595c81abc8069e5ca0c2f443b54c57dd9b5556374b2acb0bfac870fdcc2673ff245b540ef4382354568aac9f5029d779d95b92cf83c67b41d
-
/data/user/0/yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqj/app_DynamicOptDex/esp.json
Filesize658KB
MD5f5b670c70ec9de38dbbdff7faec3ea3f
SHA1dfad6f32fbc47e6f0661b03a0893798b06b4ada8
SHA2560d60d5f7449a71e717c95aeec213ea1b576261edd2ed5f4bd77bfd59c24a3fb0
SHA512602abe841b95b0a9ae12a4949d37dd4f968a568b1e20ee81bd912452b3a829ebdd9f3059cabcd93e7f402d25e475ea724b414fc770f433bd4f57c4ae132fb115
-
/data/user/0/yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqj/app_DynamicOptDex/esp.json
Filesize658KB
MD5f5b670c70ec9de38dbbdff7faec3ea3f
SHA1dfad6f32fbc47e6f0661b03a0893798b06b4ada8
SHA2560d60d5f7449a71e717c95aeec213ea1b576261edd2ed5f4bd77bfd59c24a3fb0
SHA512602abe841b95b0a9ae12a4949d37dd4f968a568b1e20ee81bd912452b3a829ebdd9f3059cabcd93e7f402d25e475ea724b414fc770f433bd4f57c4ae132fb115
-
/data/user/0/yijboxtcpjmuxjkrfhdauzqiser.dtbugmaffdhgmetlkjs.uidkhqcdqoqj/app_DynamicOptDex/oat/esp.json.cur.prof
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e