General

  • Target

    7DDE3353E679BD4EC0A5C8655D95EDB9A41E2A6C284ECE79E764FE91A709BA14.apk

  • Size

    2.3MB

  • Sample

    220602-kesyasaagr

  • MD5

    dafe74f89d07bb8e452506809920ceb8

  • SHA1

    449270d46ff82f62edd095a967b0751e62b4054f

  • SHA256

    7dde3353e679bd4ec0a5c8655d95edb9a41e2a6c284ece79e764fe91a709ba14

  • SHA512

    243ff9a864b66c46a8202b90b4d3d899f16d4953a91414c83024a6366f286c1e55bbacc80bbaa1370e42fbaf3050ca614164ade64c69175ec8c19bed2cf4153a

Malware Config

Extracted

Family

alienbot

C2

http://abracadabra6.xyz

Targets

    • Target

      7DDE3353E679BD4EC0A5C8655D95EDB9A41E2A6C284ECE79E764FE91A709BA14.apk

    • Size

      2.3MB

    • MD5

      dafe74f89d07bb8e452506809920ceb8

    • SHA1

      449270d46ff82f62edd095a967b0751e62b4054f

    • SHA256

      7dde3353e679bd4ec0a5c8655d95edb9a41e2a6c284ece79e764fe91a709ba14

    • SHA512

      243ff9a864b66c46a8202b90b4d3d899f16d4953a91414c83024a6366f286c1e55bbacc80bbaa1370e42fbaf3050ca614164ade64c69175ec8c19bed2cf4153a

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks