General
-
Target
023401cb52793c28925cd213f4c8ef48cef18b904cfcee01880cb219f8844cfc.bin
-
Size
2.1MB
-
Sample
230831-1xgkzsba52
-
MD5
f962f5880d51312dc97276cd17f35f63
-
SHA1
e432cd2258dec9fd05470726e9648a7501839b3f
-
SHA256
023401cb52793c28925cd213f4c8ef48cef18b904cfcee01880cb219f8844cfc
-
SHA512
d146f9b8be9cad7e13730b4f70b7ed144b2bef7c783cd8728d73c5dfc7b09b64a3176f3e69bc4a3b6bad4aea558026d62f3deba6b6d88ab7192d22869020ef43
-
SSDEEP
49152:Bn1jZ+H/ztKOsWzWg2aMy0J0801I/rfhLxxOaQRmDcl1dIpkJnR/59G:51kfztjsvN/hLPNQRiML9G
Static task
static1
Behavioral task
behavioral1
Sample
023401cb52793c28925cd213f4c8ef48cef18b904cfcee01880cb219f8844cfc.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
023401cb52793c28925cd213f4c8ef48cef18b904cfcee01880cb219f8844cfc.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
023401cb52793c28925cd213f4c8ef48cef18b904cfcee01880cb219f8844cfc.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
HM_JsBridge.js
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
HM_JsBridge.js
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
consentform.html
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
consentform.html
Resource
win10v2004-20230703-en
Malware Config
Extracted
alienbot
http://dijitalgirisbigi.net
Extracted
alienbot
http://dijitalgirisbigi.net
Targets
-
-
Target
023401cb52793c28925cd213f4c8ef48cef18b904cfcee01880cb219f8844cfc.bin
-
Size
2.1MB
-
MD5
f962f5880d51312dc97276cd17f35f63
-
SHA1
e432cd2258dec9fd05470726e9648a7501839b3f
-
SHA256
023401cb52793c28925cd213f4c8ef48cef18b904cfcee01880cb219f8844cfc
-
SHA512
d146f9b8be9cad7e13730b4f70b7ed144b2bef7c783cd8728d73c5dfc7b09b64a3176f3e69bc4a3b6bad4aea558026d62f3deba6b6d88ab7192d22869020ef43
-
SSDEEP
49152:Bn1jZ+H/ztKOsWzWg2aMy0J0801I/rfhLxxOaQRmDcl1dIpkJnR/59G:51kfztjsvN/hLPNQRiML9G
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads the content of SMS inbox messages.
-
Reads the content of outgoing SMS messages.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-
-
-
Target
HM_JsBridge.js
-
Size
1KB
-
MD5
f2e7316750f128a4b72a61a9fc8ed362
-
SHA1
228d0209618cb848f153a4c9daf45112dbe6a5ca
-
SHA256
45bd4f9fbae5e062f1a2f2a3fb4d71e4de8b54990eb81a8f30bad83ecd6096aa
-
SHA512
308760b82cfe9fdd625c8528a4ebb4d0a2186b4ffc9ee6d16e0f1ccb73c56e8cf6301c44ef139776242cb24bc9f43308951a4fff49854d0f08603801393aa41d
Score1/10 -
-
-
Target
consentform.html
-
Size
27KB
-
MD5
7a2ed1a6df8839dd8936a86d9edccabe
-
SHA1
7bc1af528444afca678905059cb1ba9fade65352
-
SHA256
d02fbd55c1b5da3fa1f77c52f5633421395a3bf228457521512b37cdacd65f9c
-
SHA512
ea0c3e512b37e340f4c0a49196344f1dd5aef38c469ba124605518e913be601a5b6a92a50f00e962bc90041bb80e51480254c7902032d894b7d24be5aec47097
-
SSDEEP
768:wEh4FOT6bJdK0D7fkvaqF1b6cY4c5rC28c54NTc5Jt:th44GbJdKoncY4c5Wc5wc57
Score1/10 -