General

  • Target

    67D2F328C59F4A2866006CDD18CA81C9E3F882D585FC42B244FF397293087C44.apk

  • Size

    2.3MB

  • Sample

    220602-kdjcgaedf4

  • MD5

    3efa6d294bd8115fcd1b228fbb388a44

  • SHA1

    11440309458acdce2514b531ea1057f4a8ed04c1

  • SHA256

    67d2f328c59f4a2866006cdd18ca81c9e3f882d585fc42b244ff397293087c44

  • SHA512

    c4b3ff7287dc7fc7c7359c8dd8ffb4c2eb0dc39a0f5d3305aeb69225d54b0dd15272d0cdc5086bb79d18a05f22e06b48481fc8b96c55087304693551265c8075

Malware Config

Extracted

Family

alienbot

C2

http://ukalasey9.com

Targets

    • Target

      67D2F328C59F4A2866006CDD18CA81C9E3F882D585FC42B244FF397293087C44.apk

    • Size

      2.3MB

    • MD5

      3efa6d294bd8115fcd1b228fbb388a44

    • SHA1

      11440309458acdce2514b531ea1057f4a8ed04c1

    • SHA256

      67d2f328c59f4a2866006cdd18ca81c9e3f882d585fc42b244ff397293087c44

    • SHA512

      c4b3ff7287dc7fc7c7359c8dd8ffb4c2eb0dc39a0f5d3305aeb69225d54b0dd15272d0cdc5086bb79d18a05f22e06b48481fc8b96c55087304693551265c8075

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks