General

  • Target

    FE23B30A9296477557F027D4710E81EB1B08D65A1A83B6D81A4ED6128ED6E2A0.apk

  • Size

    1.5MB

  • Sample

    220603-gcsmzaaag5

  • MD5

    b8328a55e1c340c1b4c7ca622ad79649

  • SHA1

    fcc39b953d047b4cc9e553e0b28ce5410b4f5244

  • SHA256

    fe23b30a9296477557f027d4710e81eb1b08d65a1a83b6d81a4ed6128ed6e2a0

  • SHA512

    1ab9ce5bdc0ea49b1f3d023954388d3e97e09820a6ec438fd422c613167bbd6bd0fb4ebae109e94331776d29149dcca938353bb0f567a80ebd401c87e88849cf

Malware Config

Extracted

Family

alienbot

C2

http://kryll.ug

Targets

    • Target

      FE23B30A9296477557F027D4710E81EB1B08D65A1A83B6D81A4ED6128ED6E2A0.apk

    • Size

      1.5MB

    • MD5

      b8328a55e1c340c1b4c7ca622ad79649

    • SHA1

      fcc39b953d047b4cc9e553e0b28ce5410b4f5244

    • SHA256

      fe23b30a9296477557f027d4710e81eb1b08d65a1a83b6d81a4ed6128ed6e2a0

    • SHA512

      1ab9ce5bdc0ea49b1f3d023954388d3e97e09820a6ec438fd422c613167bbd6bd0fb4ebae109e94331776d29149dcca938353bb0f567a80ebd401c87e88849cf

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks