General

  • Target

    e7aaa8fc7985a2229f5af5b2fb8d460e9fe4e8fc6c3d2a83134d56756bdcd344.bin

  • Size

    2.1MB

  • Sample

    230911-1xvgvabc6v

  • MD5

    cf2d7238e9d7a1a384b431c7660c5a7a

  • SHA1

    a5da57e5eb9db610bcf2096cf0539421b4cc28e3

  • SHA256

    e7aaa8fc7985a2229f5af5b2fb8d460e9fe4e8fc6c3d2a83134d56756bdcd344

  • SHA512

    51c4bbaec9bc6dcf70dbec907cfad3dde437358cb55bf2317992aa59f0ad5fd18f15cac9a65914530ee5867dc8c5bc390ccfabe317a0d4d9ab5f954eb400c888

  • SSDEEP

    49152:4aJDuO8N6JkJeDHFddqUF+klkmWn0J0801XJ+HgY/scl1dIpkJeRZ5KGejMT:lJDuO8g1leUFFljgYqM4KGeYT

Malware Config

Extracted

Family

alienbot

C2

http://limit-tanimlama.net

rc4.plain

Extracted

Family

alienbot

C2

http://limit-tanimlama.net

Targets

    • Target

      e7aaa8fc7985a2229f5af5b2fb8d460e9fe4e8fc6c3d2a83134d56756bdcd344.bin

    • Size

      2.1MB

    • MD5

      cf2d7238e9d7a1a384b431c7660c5a7a

    • SHA1

      a5da57e5eb9db610bcf2096cf0539421b4cc28e3

    • SHA256

      e7aaa8fc7985a2229f5af5b2fb8d460e9fe4e8fc6c3d2a83134d56756bdcd344

    • SHA512

      51c4bbaec9bc6dcf70dbec907cfad3dde437358cb55bf2317992aa59f0ad5fd18f15cac9a65914530ee5867dc8c5bc390ccfabe317a0d4d9ab5f954eb400c888

    • SSDEEP

      49152:4aJDuO8N6JkJeDHFddqUF+klkmWn0J0801XJ+HgY/scl1dIpkJeRZ5KGejMT:lJDuO8g1leUFFljgYqM4KGeYT

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Target

      HM_JsBridge.js

    • Size

      1KB

    • MD5

      f2e7316750f128a4b72a61a9fc8ed362

    • SHA1

      228d0209618cb848f153a4c9daf45112dbe6a5ca

    • SHA256

      45bd4f9fbae5e062f1a2f2a3fb4d71e4de8b54990eb81a8f30bad83ecd6096aa

    • SHA512

      308760b82cfe9fdd625c8528a4ebb4d0a2186b4ffc9ee6d16e0f1ccb73c56e8cf6301c44ef139776242cb24bc9f43308951a4fff49854d0f08603801393aa41d

    Score
    5/10
    • Drops file in System32 directory

    • Target

      consentform.html

    • Size

      27KB

    • MD5

      7a2ed1a6df8839dd8936a86d9edccabe

    • SHA1

      7bc1af528444afca678905059cb1ba9fade65352

    • SHA256

      d02fbd55c1b5da3fa1f77c52f5633421395a3bf228457521512b37cdacd65f9c

    • SHA512

      ea0c3e512b37e340f4c0a49196344f1dd5aef38c469ba124605518e913be601a5b6a92a50f00e962bc90041bb80e51480254c7902032d894b7d24be5aec47097

    • SSDEEP

      768:wEh4FOT6bJdK0D7fkvaqF1b6cY4c5rC28c54NTc5Jt:th44GbJdKoncY4c5Wc5wc57

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks