General

  • Target

    53cbbb27adb6465242470e8452f57df84683b391ab971cf9edbaf92cb150e3c9.apk

  • Size

    2.7MB

  • Sample

    211015-k11j9sagc2

  • MD5

    75f58a773f1c7e80277849b1ff5d3c36

  • SHA1

    0cc8391177ea4906b35736216a6eaca0b699dcea

  • SHA256

    53cbbb27adb6465242470e8452f57df84683b391ab971cf9edbaf92cb150e3c9

  • SHA512

    784aa35beb76fbb3b618617c80f7192dbc033bd3803826fe7224f948ba0e99c9d4419dc8a922cca8908b3969ae550b81c4d9d6571f232f5ba246b34ec84da2ac

Malware Config

Extracted

Family

alienbot

C2

http://flpaowulouriaos.ml

Targets

    • Target

      53cbbb27adb6465242470e8452f57df84683b391ab971cf9edbaf92cb150e3c9.apk

    • Size

      2.7MB

    • MD5

      75f58a773f1c7e80277849b1ff5d3c36

    • SHA1

      0cc8391177ea4906b35736216a6eaca0b699dcea

    • SHA256

      53cbbb27adb6465242470e8452f57df84683b391ab971cf9edbaf92cb150e3c9

    • SHA512

      784aa35beb76fbb3b618617c80f7192dbc033bd3803826fe7224f948ba0e99c9d4419dc8a922cca8908b3969ae550b81c4d9d6571f232f5ba246b34ec84da2ac

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks