General

  • Target

    BBF104DD9BFEF77855EAF4F33E4C62C8CA7CF7D7B26C4C2745098A5E198DBAA2.apk

  • Size

    1.9MB

  • Sample

    220602-nhscqabbep

  • MD5

    53184189e7286f3f273938fe05d429c1

  • SHA1

    a2160cfd87827a1650077def9dadc5f3e5b8bb2c

  • SHA256

    bbf104dd9bfef77855eaf4f33e4c62c8ca7cf7d7b26c4c2745098a5e198dbaa2

  • SHA512

    c9240dc01df598b2ae78fd991f0b715ddb866bf79d5c1fcb908033e2d7ccaa12fc6933c519948b685657ed5f64b2e1e154b57c82e3dbd622f090594402dca98c

Malware Config

Extracted

Family

alienbot

C2

http://zesasar11.com

Targets

    • Target

      BBF104DD9BFEF77855EAF4F33E4C62C8CA7CF7D7B26C4C2745098A5E198DBAA2.apk

    • Size

      1.9MB

    • MD5

      53184189e7286f3f273938fe05d429c1

    • SHA1

      a2160cfd87827a1650077def9dadc5f3e5b8bb2c

    • SHA256

      bbf104dd9bfef77855eaf4f33e4c62c8ca7cf7d7b26c4c2745098a5e198dbaa2

    • SHA512

      c9240dc01df598b2ae78fd991f0b715ddb866bf79d5c1fcb908033e2d7ccaa12fc6933c519948b685657ed5f64b2e1e154b57c82e3dbd622f090594402dca98c

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks