Analysis
-
max time kernel
604964s -
max time network
165s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
02-06-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
8BEBC8534BCD0E053862BD5FB4372184A839CDE85F1B9AAC18A887C64EEEA68A.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
8BEBC8534BCD0E053862BD5FB4372184A839CDE85F1B9AAC18A887C64EEEA68A.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
8BEBC8534BCD0E053862BD5FB4372184A839CDE85F1B9AAC18A887C64EEEA68A.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
8BEBC8534BCD0E053862BD5FB4372184A839CDE85F1B9AAC18A887C64EEEA68A.apk
-
Size
2.4MB
-
MD5
76cb07005d195f9acc37ce76ff6df8d1
-
SHA1
747a3561268d733ac47cc8ed0e14b5095991ec46
-
SHA256
8bebc8534bcd0e053862bd5fb4372184a839cde85f1b9aac18a887c64eeea68a
-
SHA512
504f38e17f93abd2b46cdefc8a13b1e461708026ad47191eed7a8704e35b57fcd3eaa57d44440c450b8873ff04edbd6249aca4ff397c49f55d3d85706de4685a
Malware Config
Extracted
alienbot
http://ukalasey5.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbciioc pid Process /data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json 6021 udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci /data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json 6021 udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json
Filesize824KB
MD54bdf8369f0abef8af57c66519e0350e3
SHA17f5862be76cc5a05c02481201433ad4d27555169
SHA256f2993ced77add5b01cc065f00e23a457938752fed478de8132835ddca38efe27
SHA512079ad67755a819b22900169866a06537ab3e3a92ef62375e7c67d7d5ae94d1d41e983f0bd92bd149840c1232adaf2f9c155450137ae1822f22fc2f2978bcf754
-
/data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json
Filesize824KB
MD5881bcd3c321e3ebd6a82e8579e64b399
SHA1cdcb1778d33af2893cd58f5aabcbd7bf34ed685e
SHA2567d3186fdf4e36e8578d9cf2c47c10550b379b42b18121e4e9419e9cb65b75791
SHA512a1794b4335c41e6b4338fb32a82fc4ffd2c1b10f65972f1d901c35f8f65c7f6b3512ef512776b4558a4b357df385c331c9ae237a9c0776d56aeb64c81c39106c
-
/data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/ixcj.json
Filesize824KB
MD5881bcd3c321e3ebd6a82e8579e64b399
SHA1cdcb1778d33af2893cd58f5aabcbd7bf34ed685e
SHA2567d3186fdf4e36e8578d9cf2c47c10550b379b42b18121e4e9419e9cb65b75791
SHA512a1794b4335c41e6b4338fb32a82fc4ffd2c1b10f65972f1d901c35f8f65c7f6b3512ef512776b4558a4b357df385c331c9ae237a9c0776d56aeb64c81c39106c
-
/data/user/0/udguqzwjtrmqlegrkxcfbbsy.tnoxyruqauperpzrznqahxycjbo.assltacbhkqwwchlbpwcurqsbci/app_DynamicOptDex/oat/ixcj.json.cur.prof
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e