General

  • Target

    126e3d78cf017c41344024ccfc4e7c162e912822994a0e187f88b832eef82855.apk

  • Size

    2.8MB

  • Sample

    211015-kzmxsaagb8

  • MD5

    3970887714ad3d912187fcd8fe82818c

  • SHA1

    20ba28a180fe28d269a63cbf3eed3e801f9013de

  • SHA256

    126e3d78cf017c41344024ccfc4e7c162e912822994a0e187f88b832eef82855

  • SHA512

    3a7ec3c78d76078279db292edaabeb3ffe5fa808519d7e1524b9fef130d1588f93172d0e47abf992e1d032d6103f99cc77bf64853e8e061312c9c2853225d877

Malware Config

Extracted

Family

alienbot

C2

http://apkupdateandosuriasueiasas.ml

Targets

    • Target

      126e3d78cf017c41344024ccfc4e7c162e912822994a0e187f88b832eef82855.apk

    • Size

      2.8MB

    • MD5

      3970887714ad3d912187fcd8fe82818c

    • SHA1

      20ba28a180fe28d269a63cbf3eed3e801f9013de

    • SHA256

      126e3d78cf017c41344024ccfc4e7c162e912822994a0e187f88b832eef82855

    • SHA512

      3a7ec3c78d76078279db292edaabeb3ffe5fa808519d7e1524b9fef130d1588f93172d0e47abf992e1d032d6103f99cc77bf64853e8e061312c9c2853225d877

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks