General

  • Target

    35BC5FB59D33E48CC86B9DF91AD92D7BD826E7CBFAEB65CEB901318B0652CEB7.apk

  • Size

    1.8MB

  • Sample

    220602-nd9q7sfee4

  • MD5

    b1bd9844707d455e9e2710aacfc30b68

  • SHA1

    215f3e25bb47c47f55bea88adf51e77f97ad6295

  • SHA256

    35bc5fb59d33e48cc86b9df91ad92d7bd826e7cbfaeb65ceb901318b0652ceb7

  • SHA512

    0b172b2acfab85a968a83a09ad45046e1831e96196ffb66f32f49bbfeb9f64c0dbd5ef13efefe2453fbbe9ad9b4bff6100b38b3987de7b282feacfb4dfdadf97

Malware Config

Extracted

Family

alienbot

C2

http://konusuyonyapraam.cyou

Targets

    • Target

      35BC5FB59D33E48CC86B9DF91AD92D7BD826E7CBFAEB65CEB901318B0652CEB7.apk

    • Size

      1.8MB

    • MD5

      b1bd9844707d455e9e2710aacfc30b68

    • SHA1

      215f3e25bb47c47f55bea88adf51e77f97ad6295

    • SHA256

      35bc5fb59d33e48cc86b9df91ad92d7bd826e7cbfaeb65ceb901318b0652ceb7

    • SHA512

      0b172b2acfab85a968a83a09ad45046e1831e96196ffb66f32f49bbfeb9f64c0dbd5ef13efefe2453fbbe9ad9b4bff6100b38b3987de7b282feacfb4dfdadf97

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks