General

  • Target

    7403196129.zip

  • Size

    962KB

  • Sample

    220429-z9kbzaddc8

  • MD5

    85a3cb955924455cb2a332aa8f6cc8a4

  • SHA1

    382d7540a463a7b0ec837cba9ccdb7b71a53a308

  • SHA256

    55cbb395d00a91b60a92380fe30c470a3b653ca62709aff1184ffee5e0bff65b

  • SHA512

    0a4bde692a9cee339839277a0beadbbbaf92f3f2ca53f59ad25f1775397780eed3fe104dbff4460da650f28c16df61ee6588c4ec566f5e556f85d0339c54d218

Malware Config

Extracted

Family

alienbot

C2

http://kyzpc.digital

Targets

    • Target

      1a182609a93ac4914b4abb1f932b18f25a192be3ef65cbd24f8737da3f8192d1

    • Size

      1.0MB

    • MD5

      5c5ab562d16a0eb6d61ea924faa5e31a

    • SHA1

      9f26bb33eb7c75a7f84d18a849dbd5f1861aebda

    • SHA256

      1a182609a93ac4914b4abb1f932b18f25a192be3ef65cbd24f8737da3f8192d1

    • SHA512

      289623e38104fc059cec8be69e86e389fa30f235411ba16cb8d9552b4f6d17aedc1f6a03fe88bb1171d2bb9718577742c10d6c287b50b423e5f2438ee0cdc683

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks