Analysis
-
max time kernel
609003s -
max time network
167s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
02-06-2022 11:15
Static task
static1
Behavioral task
behavioral1
Sample
36FC4B0C5469C8AF65F9EFDC0D99A1B686A6DF9A3E49336177EE73300F62BA5B.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
36FC4B0C5469C8AF65F9EFDC0D99A1B686A6DF9A3E49336177EE73300F62BA5B.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
36FC4B0C5469C8AF65F9EFDC0D99A1B686A6DF9A3E49336177EE73300F62BA5B.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
36FC4B0C5469C8AF65F9EFDC0D99A1B686A6DF9A3E49336177EE73300F62BA5B.apk
-
Size
1.9MB
-
MD5
c497c6c5efc7e6e104254eacc8b09d44
-
SHA1
79052f5fbf946a3fc7db0f11bddf95f0591f9492
-
SHA256
36fc4b0c5469c8af65f9efdc0d99a1b686a6df9a3e49336177ee73300f62ba5b
-
SHA512
a5127bf8095f2c602220c541ed94ddf508b34b3160de43898e3c52be08eab88ca59846a3567522d47f1d9e92c5d391ccb5081c1b6baa13927915e9ed5b0bb77b
Malware Config
Extracted
alienbot
http://zeus45-3.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
tjktyditp.ujamibpyhjawrxqczqnlg.bwnibrbmacmgtlioc pid Process /data/user/0/tjktyditp.ujamibpyhjawrxqczqnlg.bwnibrbmacmgtl/app_DynamicOptDex/KQfj.json 6309 tjktyditp.ujamibpyhjawrxqczqnlg.bwnibrbmacmgtl /data/user/0/tjktyditp.ujamibpyhjawrxqczqnlg.bwnibrbmacmgtl/app_DynamicOptDex/KQfj.json 6309 tjktyditp.ujamibpyhjawrxqczqnlg.bwnibrbmacmgtl
Processes
-
tjktyditp.ujamibpyhjawrxqczqnlg.bwnibrbmacmgtl1⤵
- Loads dropped Dex/Jar
PID:6309 -
getprop ro.miui.ui.version.name2⤵PID:6453
-
-
getprop ro.miui.ui.version.name2⤵PID:6543
-
-
getprop ro.miui.ui.version.name2⤵PID:6588
-
-
getprop ro.miui.ui.version.name2⤵PID:6633
-
-
getprop ro.miui.ui.version.name2⤵PID:6677
-
-
getprop ro.miui.ui.version.name2⤵PID:6719
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
697KB
MD59539504f6a6d9de5fd3d2979a156c96f
SHA18f314e8e3a1a2fd5c7a4c36df9f434b45bd81227
SHA256ef7764db3c1e0054f99cad4718938ef0abaf6ffd9f481753cfb1d4da18599259
SHA512c72e6f913a7bbab92034a2d1601c06deb19dab633d31ca291ee2f79d8dc301ba6e91e26d9124e39a3437328fc9edbff7617707731a73b281c19b36c2e4c4dfcc
-
Filesize
697KB
MD56c301744b3b97ace1bbfb089a067bce6
SHA10ca09190f59f0af7f0119524ecf566be6bad7c25
SHA256d72e8c1a5396e7f9c311b7d73a7e3d6d23d4b875886bed4c15a675427c176cfa
SHA512787dcd8513fb2cd025e8bebe625b588e8cf85ca87b79b4e01eb85b3e225849b1ace84741364426843d8977d8e82df9ba34576d9f3e6ada2a8ad16305bb1f3c03
-
Filesize
697KB
MD56c301744b3b97ace1bbfb089a067bce6
SHA10ca09190f59f0af7f0119524ecf566be6bad7c25
SHA256d72e8c1a5396e7f9c311b7d73a7e3d6d23d4b875886bed4c15a675427c176cfa
SHA512787dcd8513fb2cd025e8bebe625b588e8cf85ca87b79b4e01eb85b3e225849b1ace84741364426843d8977d8e82df9ba34576d9f3e6ada2a8ad16305bb1f3c03
-
/data/user/0/tjktyditp.ujamibpyhjawrxqczqnlg.bwnibrbmacmgtl/app_DynamicOptDex/oat/KQfj.json.cur.prof
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e