General

  • Target

    7c834908030f6884afde99b50812f20ccd5253ae1df1d9370a2d0a201014af0b

  • Size

    1.5MB

  • Sample

    220625-cdqsjshgcr

  • MD5

    292c9e26ffe79e019bb67c1a4cf53d77

  • SHA1

    65c4ce134b9221c59a923f3c5f06cad528edb0fd

  • SHA256

    7c834908030f6884afde99b50812f20ccd5253ae1df1d9370a2d0a201014af0b

  • SHA512

    4d863adc866d9f07c51310f3f651ac3d0bf144708addf9aa04f5aa005901eb9a5553c20aa21e12de17f6b250d15933f3897e5b59cc402b153d0095fec82bb898

Malware Config

Extracted

Family

alienbot

C2

http://odry.london

Targets

    • Target

      7c834908030f6884afde99b50812f20ccd5253ae1df1d9370a2d0a201014af0b

    • Size

      1.5MB

    • MD5

      292c9e26ffe79e019bb67c1a4cf53d77

    • SHA1

      65c4ce134b9221c59a923f3c5f06cad528edb0fd

    • SHA256

      7c834908030f6884afde99b50812f20ccd5253ae1df1d9370a2d0a201014af0b

    • SHA512

      4d863adc866d9f07c51310f3f651ac3d0bf144708addf9aa04f5aa005901eb9a5553c20aa21e12de17f6b250d15933f3897e5b59cc402b153d0095fec82bb898

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks