General

  • Target

    96665e4a1638bec10375c4e402fbdbef6e7adee2849dcb5a15da4f9052391fde

  • Size

    3.2MB

  • Sample

    210319-7eplt9p8vx

  • MD5

    e0ad7691ce2766e8023aafb2b7954350

  • SHA1

    87aa7b15fd5af3153486eb3b17f187da2da0e0ef

  • SHA256

    96665e4a1638bec10375c4e402fbdbef6e7adee2849dcb5a15da4f9052391fde

  • SHA512

    e39f563d76537d88b90ec4d91008e2cba05e11638ea52e87987acbbb8e58c4b54312062acc27687acd48904664ca8c241924c743a9f27e009a23198727b074cc

Malware Config

Extracted

Family

alienbot

C2

http://lgntsasasa.com

Targets

    • Target

      96665e4a1638bec10375c4e402fbdbef6e7adee2849dcb5a15da4f9052391fde

    • Size

      3.2MB

    • MD5

      e0ad7691ce2766e8023aafb2b7954350

    • SHA1

      87aa7b15fd5af3153486eb3b17f187da2da0e0ef

    • SHA256

      96665e4a1638bec10375c4e402fbdbef6e7adee2849dcb5a15da4f9052391fde

    • SHA512

      e39f563d76537d88b90ec4d91008e2cba05e11638ea52e87987acbbb8e58c4b54312062acc27687acd48904664ca8c241924c743a9f27e009a23198727b074cc

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks