Analysis
-
max time kernel
4174569s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
25-05-2022 01:23
Static task
static1
Behavioral task
behavioral1
Sample
82f984f49b7133b9c5081b7e40fa89125867e6d3e1006fb30013089a463cfcec.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
82f984f49b7133b9c5081b7e40fa89125867e6d3e1006fb30013089a463cfcec.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
82f984f49b7133b9c5081b7e40fa89125867e6d3e1006fb30013089a463cfcec.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
82f984f49b7133b9c5081b7e40fa89125867e6d3e1006fb30013089a463cfcec.apk
-
Size
2.1MB
-
MD5
7cfae3ed58219833949f9d7e79b7b621
-
SHA1
a0ee356a6a88b60bb7128cd2c7167caa45f5f890
-
SHA256
82f984f49b7133b9c5081b7e40fa89125867e6d3e1006fb30013089a463cfcec
-
SHA512
b30aea2132eb9bbb6f96680e14a75be7fabba883f5570ecbae113a92193e3cd1d2008a525551290f34ee15d621caa9f13c8e773e2b506cbce6be104239b363d0
Malware Config
Extracted
alienbot
http://hadigelgidelimm.top
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
rxitjkdxwjlx.pzbmqystccfwjmfnoba.wleijlgrpjxmndqyioc pid Process /data/user/0/rxitjkdxwjlx.pzbmqystccfwjmfnoba.wleijlgrpjxmndqy/app_DynamicOptDex/bUsf.json 6185 rxitjkdxwjlx.pzbmqystccfwjmfnoba.wleijlgrpjxmndqy /data/user/0/rxitjkdxwjlx.pzbmqystccfwjmfnoba.wleijlgrpjxmndqy/app_DynamicOptDex/bUsf.json 6185 rxitjkdxwjlx.pzbmqystccfwjmfnoba.wleijlgrpjxmndqy
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
703KB
MD5f9ae9ab06ecbcd3356352189d9e5193e
SHA1e5edfa493f5a274d446cd86e507bd1dd29766480
SHA256ff3c86f124f0c36e05fb735d3b9bbf769fe84058d2abd37df6b581e352a3cb6b
SHA512213b46004fff2d4ea51ce22a821f48153ed2570931645fe25ab6ce3164463fe1d07b164d8fdd985c302fa79802a95626e651f3c3aa9df80e3d115f7a5df9fb56
-
Filesize
703KB
MD5093e2a50ff9e98ee3ef48639818ad3fc
SHA180b1d35c25b77e72ec20b228153e1a27f577b25e
SHA2567fb61324349de69a38d7abd4b341b37e262351a2773960b7e8d9ae878f5ad77e
SHA5126a180a7aa9b2c5e22c6abe2afef58d131b605ef6b17c59403ab5776e2a7e3b34654fdbd4ffc5001c38c29aa2104a9608d7ea767921398d65c282201e64c85317
-
Filesize
703KB
MD5093e2a50ff9e98ee3ef48639818ad3fc
SHA180b1d35c25b77e72ec20b228153e1a27f577b25e
SHA2567fb61324349de69a38d7abd4b341b37e262351a2773960b7e8d9ae878f5ad77e
SHA5126a180a7aa9b2c5e22c6abe2afef58d131b605ef6b17c59403ab5776e2a7e3b34654fdbd4ffc5001c38c29aa2104a9608d7ea767921398d65c282201e64c85317
-
/data/user/0/rxitjkdxwjlx.pzbmqystccfwjmfnoba.wleijlgrpjxmndqy/app_DynamicOptDex/oat/bUsf.json.cur.prof
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e