General

  • Target

    AD221F6360F2202358A9603D377C0538349DF1BB598D9DBCA975CDB426D5F5DE.apk

  • Size

    1.7MB

  • Sample

    220603-g96wvsbgb9

  • MD5

    dc074a4f513ff203176486e745594d11

  • SHA1

    d238559c0faf5c0cb27c7897c8460c602bdda26f

  • SHA256

    ad221f6360f2202358a9603d377c0538349df1bb598d9dbca975cdb426d5f5de

  • SHA512

    c33dea43fa0fea4a9867fcea1b8d2de518046ee51dedeb24181bf73c375221b249d4cf1ad9bf9def84620f746fd6b1d9bd935285392bf88b5928a3c54c83e216

Malware Config

Extracted

Family

alienbot

C2

http://zesasar8.com

Targets

    • Target

      AD221F6360F2202358A9603D377C0538349DF1BB598D9DBCA975CDB426D5F5DE.apk

    • Size

      1.7MB

    • MD5

      dc074a4f513ff203176486e745594d11

    • SHA1

      d238559c0faf5c0cb27c7897c8460c602bdda26f

    • SHA256

      ad221f6360f2202358a9603d377c0538349df1bb598d9dbca975cdb426d5f5de

    • SHA512

      c33dea43fa0fea4a9867fcea1b8d2de518046ee51dedeb24181bf73c375221b249d4cf1ad9bf9def84620f746fd6b1d9bd935285392bf88b5928a3c54c83e216

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks