General

  • Target

    4FE5C2F3972B2856957742F7BCABF14102CB8D7DF71E21C30DC6D6D023E9D7EE.apk

  • Size

    1.8MB

  • Sample

    220602-ndgenabafk

  • MD5

    985b428c39115820a7a5052fb1e68048

  • SHA1

    e7ed680407b9bbc4eafb3554f83ce34973605f92

  • SHA256

    4fe5c2f3972b2856957742f7bcabf14102cb8d7df71e21c30dc6d6d023e9d7ee

  • SHA512

    29f581db92139a4c23fdd19deda902ff4952a4aa804f678a814562aef50b425943c59ab72c9409a5270f13e1f5213d4f167f810a0e7be00cadfe75ab06e386e1

Malware Config

Extracted

Family

alienbot

C2

http://zesasar9.com

Targets

    • Target

      4FE5C2F3972B2856957742F7BCABF14102CB8D7DF71E21C30DC6D6D023E9D7EE.apk

    • Size

      1.8MB

    • MD5

      985b428c39115820a7a5052fb1e68048

    • SHA1

      e7ed680407b9bbc4eafb3554f83ce34973605f92

    • SHA256

      4fe5c2f3972b2856957742f7bcabf14102cb8d7df71e21c30dc6d6d023e9d7ee

    • SHA512

      29f581db92139a4c23fdd19deda902ff4952a4aa804f678a814562aef50b425943c59ab72c9409a5270f13e1f5213d4f167f810a0e7be00cadfe75ab06e386e1

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks