General

  • Target

    9975519E1AE9CEFFC6A7841B8C26FA356B98C0FD1E48DF80BAD49865066C28C7.apk

  • Size

    2.3MB

  • Sample

    220603-g83staffel

  • MD5

    1a3388bc2de001556f2ec1af473f8989

  • SHA1

    d7d74bdef5b6ab2d4478cfec4e0181feb155ed45

  • SHA256

    9975519e1ae9ceffc6a7841b8c26fa356b98c0fd1e48df80bad49865066c28c7

  • SHA512

    419a9afdb95fa5764d0667a834e69f862eddb6301b74ec23986f688a72792fc7dc26187dff9edfc7ee791664362abbaa94196c4ed452f133623fcec8c1d50e38

Malware Config

Extracted

Family

alienbot

C2

http://kucsas.com

Targets

    • Target

      9975519E1AE9CEFFC6A7841B8C26FA356B98C0FD1E48DF80BAD49865066C28C7.apk

    • Size

      2.3MB

    • MD5

      1a3388bc2de001556f2ec1af473f8989

    • SHA1

      d7d74bdef5b6ab2d4478cfec4e0181feb155ed45

    • SHA256

      9975519e1ae9ceffc6a7841b8c26fa356b98c0fd1e48df80bad49865066c28c7

    • SHA512

      419a9afdb95fa5764d0667a834e69f862eddb6301b74ec23986f688a72792fc7dc26187dff9edfc7ee791664362abbaa94196c4ed452f133623fcec8c1d50e38

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks