General

  • Target

    8488505c006cd22ae700b50495a36a74d2c86ac4f59936eae749be6c5f735e7a.apk

  • Size

    3MB

  • Sample

    210720-ggqxsydqge

  • MD5

    b647004476026515f30e0ab82631ea94

  • SHA1

    330add547b7721fa96f7116fbd3be6f1bea39dc9

  • SHA256

    8488505c006cd22ae700b50495a36a74d2c86ac4f59936eae749be6c5f735e7a

  • SHA512

    0c3c32c31d559e5756959cd6fc9ffa2dda0e30d704a5a68ed261eef13dd9fbcfb04b5d5efcb9494013e233f0db08b93c1dd9e34eff78abf308ff2bf0cc7e2ddb

Malware Config

Targets

    • Target

      8488505c006cd22ae700b50495a36a74d2c86ac4f59936eae749be6c5f735e7a.apk

    • Size

      3MB

    • MD5

      b647004476026515f30e0ab82631ea94

    • SHA1

      330add547b7721fa96f7116fbd3be6f1bea39dc9

    • SHA256

      8488505c006cd22ae700b50495a36a74d2c86ac4f59936eae749be6c5f735e7a

    • SHA512

      0c3c32c31d559e5756959cd6fc9ffa2dda0e30d704a5a68ed261eef13dd9fbcfb04b5d5efcb9494013e233f0db08b93c1dd9e34eff78abf308ff2bf0cc7e2ddb

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks