General

  • Target

    56943.apk

  • Size

    1.4MB

  • Sample

    230523-whbnzahc8z

  • MD5

    63bd520e98ceea016ef2377e97f0bfda

  • SHA1

    771f954bcd2570d012cc82f3bc90789116b618ff

  • SHA256

    6245fa164605d119c883a056c185f3fd9c502eba4ef08290bdc053b0db68466e

  • SHA512

    237241a9f54116ba931f5c50884a1bd686562d198d12391054ee3338a46ff44003a3a0fe115a959f79a01e0ce46f18efe12255b613872b55cdf79e0622a41e33

  • SSDEEP

    24576:tkzaymuPbH/3ZB9xiIK1fkm0cIoJHEHc7OrsSfm7BrB+cRMVy10UEF8:62uPb/ZxiI5tcxHEHc7M8BrlMVsEF8

Malware Config

Extracted

Family

alienbot

C2

http://prangadayi.com/

rc4.plain

Targets

    • Target

      56943.apk

    • Size

      1.4MB

    • MD5

      63bd520e98ceea016ef2377e97f0bfda

    • SHA1

      771f954bcd2570d012cc82f3bc90789116b618ff

    • SHA256

      6245fa164605d119c883a056c185f3fd9c502eba4ef08290bdc053b0db68466e

    • SHA512

      237241a9f54116ba931f5c50884a1bd686562d198d12391054ee3338a46ff44003a3a0fe115a959f79a01e0ce46f18efe12255b613872b55cdf79e0622a41e33

    • SSDEEP

      24576:tkzaymuPbH/3ZB9xiIK1fkm0cIoJHEHc7OrsSfm7BrB+cRMVy10UEF8:62uPb/ZxiI5tcxHEHc7M8BrlMVsEF8

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Renames multiple (156) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (162) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks