General

  • Target

    VideoPlayer.apk

  • Size

    3.3MB

  • Sample

    210823-9a5tgl5yzn

  • MD5

    30c3f2a449c75990d049b3245f2df2e9

  • SHA1

    af3e95111238f858b94a3a7a8bb4f81a6579dcf7

  • SHA256

    c23475ee87755d08d0ed5aadf879454724349798e811af0c33bc20d9c61a01d9

  • SHA512

    d0a08c8208e565afb94ea96b22ec4625412a62153c6cdf4e1c87bff26aecf6f0652c091702703c9c8e6a82decffc9d858eca955d63140ed2e14b4d47acfcd879

Malware Config

Extracted

Family

alienbot

C2

http://34.89.151.222

Targets

    • Target

      VideoPlayer.apk

    • Size

      3.3MB

    • MD5

      30c3f2a449c75990d049b3245f2df2e9

    • SHA1

      af3e95111238f858b94a3a7a8bb4f81a6579dcf7

    • SHA256

      c23475ee87755d08d0ed5aadf879454724349798e811af0c33bc20d9c61a01d9

    • SHA512

      d0a08c8208e565afb94ea96b22ec4625412a62153c6cdf4e1c87bff26aecf6f0652c091702703c9c8e6a82decffc9d858eca955d63140ed2e14b4d47acfcd879

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks