Analysis
-
max time kernel
4174777s -
max time network
166s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
25-05-2022 01:27
Static task
static1
Behavioral task
behavioral1
Sample
9dd2d36730cf6db56ca7e26a52f5a37b301262b55f6ef31edcc7424e25b22fca.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
9dd2d36730cf6db56ca7e26a52f5a37b301262b55f6ef31edcc7424e25b22fca.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
9dd2d36730cf6db56ca7e26a52f5a37b301262b55f6ef31edcc7424e25b22fca.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
9dd2d36730cf6db56ca7e26a52f5a37b301262b55f6ef31edcc7424e25b22fca.apk
-
Size
1.9MB
-
MD5
87fd326bb6c88b7968776caab25aaf35
-
SHA1
d3809313541b8bfa95567ccf05d75a8d4a28597f
-
SHA256
9dd2d36730cf6db56ca7e26a52f5a37b301262b55f6ef31edcc7424e25b22fca
-
SHA512
22f9044af6b40756ad8a7a212154d62101eefb429d15023ac7f0228918699a3bd6513b967427bea39f9d34e8bb78e5b21e1da757c2ffa9520e49d9f6b51878f9
Malware Config
Extracted
alienbot
http://cokomellatomalarko.top
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
rzqsfobsgcemppmjwcg.kkbuo.enoqhqdmyrrwecdfeiiqypioc pid Process /data/user/0/rzqsfobsgcemppmjwcg.kkbuo.enoqhqdmyrrwecdfeiiqyp/app_DynamicOptDex/jkyC.json 6199 rzqsfobsgcemppmjwcg.kkbuo.enoqhqdmyrrwecdfeiiqyp /data/user/0/rzqsfobsgcemppmjwcg.kkbuo.enoqhqdmyrrwecdfeiiqyp/app_DynamicOptDex/jkyC.json 6199 rzqsfobsgcemppmjwcg.kkbuo.enoqhqdmyrrwecdfeiiqyp
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD5e17d9804430469c586b29403b0247cd0
SHA143b9d65b9f4e609f204a845a20341680048726de
SHA2564c017daf876f09e1be5d273c4835342850da3d8b85d5898f6fe8dfac66b509fa
SHA51243875189339075a0bb188c13b305e5c340c738da579710c00a22eb074fc70a10b3fd0ad57416d02730e662499b4dd6aee519a916deb61441444ce7099fa243a9
-
Filesize
656KB
MD5325fd986eda83741fcf1e89cbc43ca7e
SHA132a15844a69d7e40a3ae09f5b4a4342077ced2cb
SHA2567dc8e62fa2c7239b19260c31af86abf7172e53a580d5f87571d2ad9be32bdb5c
SHA5121fd9f5aab87b0312d6e073c7eb4ab392e2d44a4cdb724db48451b924a96466012bb0778078244ab1b3a7ef7a8bcdece5d33637114c15ff933c69ebac5bf1b03d
-
Filesize
656KB
MD5325fd986eda83741fcf1e89cbc43ca7e
SHA132a15844a69d7e40a3ae09f5b4a4342077ced2cb
SHA2567dc8e62fa2c7239b19260c31af86abf7172e53a580d5f87571d2ad9be32bdb5c
SHA5121fd9f5aab87b0312d6e073c7eb4ab392e2d44a4cdb724db48451b924a96466012bb0778078244ab1b3a7ef7a8bcdece5d33637114c15ff933c69ebac5bf1b03d
-
/data/user/0/rzqsfobsgcemppmjwcg.kkbuo.enoqhqdmyrrwecdfeiiqyp/app_DynamicOptDex/oat/jkyC.json.cur.prof
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e