Analysis
-
max time kernel
677153s -
max time network
171s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
03-06-2022 06:29
Static task
static1
Behavioral task
behavioral1
Sample
9975519E1AE9CEFFC6A7841B8C26FA356B98C0FD1E48DF80BAD49865066C28C7.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
9975519E1AE9CEFFC6A7841B8C26FA356B98C0FD1E48DF80BAD49865066C28C7.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
9975519E1AE9CEFFC6A7841B8C26FA356B98C0FD1E48DF80BAD49865066C28C7.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
9975519E1AE9CEFFC6A7841B8C26FA356B98C0FD1E48DF80BAD49865066C28C7.apk
-
Size
2.3MB
-
MD5
1a3388bc2de001556f2ec1af473f8989
-
SHA1
d7d74bdef5b6ab2d4478cfec4e0181feb155ed45
-
SHA256
9975519e1ae9ceffc6a7841b8c26fa356b98c0fd1e48df80bad49865066c28c7
-
SHA512
419a9afdb95fa5764d0667a834e69f862eddb6301b74ec23986f688a72792fc7dc26187dff9edfc7ee791664362abbaa94196c4ed452f133623fcec8c1d50e38
Malware Config
Extracted
alienbot
http://kucsas.com
Signatures
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufyioc pid Process /data/user/0/idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy/app_DynamicOptDex/bZoFML.json 6271 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy /data/user/0/idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy/app_DynamicOptDex/bZoFML.json 6271 idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD5df1e9509ced3c76f4e60f93e2fb37f81
SHA13f970cf2a514e7f668ae3645a41d80ead1922588
SHA25659da792f25dbde544145c489bce848eda9d4175701aec14f2f170cbbb2829ad7
SHA5124d6e8969ea2483558e7cd0a81d11a045750f0f7616f60fc87059ba910ccd532d0bcf8f750f43599d7e8c28f881257fddf9ff636cf35fcd021b0111114790bb9c
-
Filesize
713KB
MD510a784a4bf5028a5332c9abd5b25089e
SHA13fdbfb8baf4428fcb2dd5e126af0ba3d8c8538d4
SHA256cea01f1b9897a2f7290f0b06c21b3d966469c813c5d59cb109eec9c0b3770513
SHA5128d610beb95c1fd354a95c4ff6a0ed25c592d4bd79db38bc392c2b9aaefbf34b5f464b9a58d2fa6c83c704b9ef4891d4b7b6d7847dceb95f69d69dcb21989bfc4
-
Filesize
713KB
MD510a784a4bf5028a5332c9abd5b25089e
SHA13fdbfb8baf4428fcb2dd5e126af0ba3d8c8538d4
SHA256cea01f1b9897a2f7290f0b06c21b3d966469c813c5d59cb109eec9c0b3770513
SHA5128d610beb95c1fd354a95c4ff6a0ed25c592d4bd79db38bc392c2b9aaefbf34b5f464b9a58d2fa6c83c704b9ef4891d4b7b6d7847dceb95f69d69dcb21989bfc4
-
/data/user/0/idiherqibgwwakoxwy.tksptyldtghbfw.bnygioaufy/app_DynamicOptDex/oat/bZoFML.json.cur.prof
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e