General

  • Target

    32EE87425AD76FB3FF6BCB4030B9450509618EFE6801CE702F74F074B08EB47A.apk

  • Size

    2.2MB

  • Sample

    220603-had78sbgd3

  • MD5

    524515db050861f90e70f0a3c15e333f

  • SHA1

    177dbc1f49d95d2d3b0e6a165866fcf30f374e9a

  • SHA256

    32ee87425ad76fb3ff6bcb4030b9450509618efe6801ce702f74f074b08eb47a

  • SHA512

    d69f6166a8b4bec23982724122724dad6e6d94b21eda52d4e1f0629cd31d5487c58d10994f772d04685a3b9285be9c4af32b5943729807547fc608cc3db786b4

Malware Config

Extracted

Family

alienbot

C2

http://perohi21.xyz

Targets

    • Target

      32EE87425AD76FB3FF6BCB4030B9450509618EFE6801CE702F74F074B08EB47A.apk

    • Size

      2.2MB

    • MD5

      524515db050861f90e70f0a3c15e333f

    • SHA1

      177dbc1f49d95d2d3b0e6a165866fcf30f374e9a

    • SHA256

      32ee87425ad76fb3ff6bcb4030b9450509618efe6801ce702f74f074b08eb47a

    • SHA512

      d69f6166a8b4bec23982724122724dad6e6d94b21eda52d4e1f0629cd31d5487c58d10994f772d04685a3b9285be9c4af32b5943729807547fc608cc3db786b4

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks