General
-
Target
56943.apk
-
Size
1.4MB
-
Sample
230523-whbnzahc8z
-
MD5
63bd520e98ceea016ef2377e97f0bfda
-
SHA1
771f954bcd2570d012cc82f3bc90789116b618ff
-
SHA256
6245fa164605d119c883a056c185f3fd9c502eba4ef08290bdc053b0db68466e
-
SHA512
237241a9f54116ba931f5c50884a1bd686562d198d12391054ee3338a46ff44003a3a0fe115a959f79a01e0ce46f18efe12255b613872b55cdf79e0622a41e33
-
SSDEEP
24576:tkzaymuPbH/3ZB9xiIK1fkm0cIoJHEHc7OrsSfm7BrB+cRMVy10UEF8:62uPb/ZxiI5tcxHEHc7M8BrlMVsEF8
Static task
static1
Behavioral task
behavioral1
Sample
56943.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
56943.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
56943.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
alienbot
http://prangadayi.com/
Targets
-
-
Target
56943.apk
-
Size
1.4MB
-
MD5
63bd520e98ceea016ef2377e97f0bfda
-
SHA1
771f954bcd2570d012cc82f3bc90789116b618ff
-
SHA256
6245fa164605d119c883a056c185f3fd9c502eba4ef08290bdc053b0db68466e
-
SHA512
237241a9f54116ba931f5c50884a1bd686562d198d12391054ee3338a46ff44003a3a0fe115a959f79a01e0ce46f18efe12255b613872b55cdf79e0622a41e33
-
SSDEEP
24576:tkzaymuPbH/3ZB9xiIK1fkm0cIoJHEHc7OrsSfm7BrB+cRMVy10UEF8:62uPb/ZxiI5tcxHEHc7M8BrlMVsEF8
Score10/10-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Renames multiple (156) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (162) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Removes a system notification.
-