General

  • Target

    0893F823017AB09A475823EE0645893D5DBB19A266A454CF5CFC42C8CF25513F.apk

  • Size

    2.0MB

  • Sample

    220603-hay8eabgf6

  • MD5

    41dea1b6a7b6c7da3d1843bf162655ab

  • SHA1

    163fb1ac29f9890866240d90047b5903a76ad5fc

  • SHA256

    0893f823017ab09a475823ee0645893d5dbb19a266a454cf5cfc42c8cf25513f

  • SHA512

    0e8106976fdbf83ad8eead88f7885bd4492ef6f7bd0a170913751af8673ecee584793d83e3117ed9f1d8dae8ff11888234721aaf0ad53e9360d51b4f6f10cf32

Malware Config

Extracted

Family

alienbot

C2

http://vurkacmaksn.site

Targets

    • Target

      0893F823017AB09A475823EE0645893D5DBB19A266A454CF5CFC42C8CF25513F.apk

    • Size

      2.0MB

    • MD5

      41dea1b6a7b6c7da3d1843bf162655ab

    • SHA1

      163fb1ac29f9890866240d90047b5903a76ad5fc

    • SHA256

      0893f823017ab09a475823ee0645893d5dbb19a266a454cf5cfc42c8cf25513f

    • SHA512

      0e8106976fdbf83ad8eead88f7885bd4492ef6f7bd0a170913751af8673ecee584793d83e3117ed9f1d8dae8ff11888234721aaf0ad53e9360d51b4f6f10cf32

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks