General

  • Target

    4FD61DEADC84584EDCC74E460877946F76740015AA15A208A5466E31E8502DB1.apk

  • Size

    2.2MB

  • Sample

    220602-ncy83sbaen

  • MD5

    8c254f45c9c31ae441691da4840d4677

  • SHA1

    6270a5b2286a21c1d4706594dfdecc31e6ac6520

  • SHA256

    4fd61deadc84584edcc74e460877946f76740015aa15a208a5466e31e8502db1

  • SHA512

    bf99bf6872821d5d161232a6a0b515d26f44b9d41dc0c5c2ccd338d4b3c95e38c6dff6151288d0e1c6f77066e226f8de7fb8688c27d6b949d6fc8dacbfeab6e3

Malware Config

Extracted

Family

alienbot

C2

http://kolombickmolonick.site

Targets

    • Target

      4FD61DEADC84584EDCC74E460877946F76740015AA15A208A5466E31E8502DB1.apk

    • Size

      2.2MB

    • MD5

      8c254f45c9c31ae441691da4840d4677

    • SHA1

      6270a5b2286a21c1d4706594dfdecc31e6ac6520

    • SHA256

      4fd61deadc84584edcc74e460877946f76740015aa15a208a5466e31e8502db1

    • SHA512

      bf99bf6872821d5d161232a6a0b515d26f44b9d41dc0c5c2ccd338d4b3c95e38c6dff6151288d0e1c6f77066e226f8de7fb8688c27d6b949d6fc8dacbfeab6e3

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks