General
-
Target
7b5f6d8b93d3dbe982f87be3988b7323cba198944e2afdc2b8143347fc17dbcf
-
Size
2.1MB
-
Sample
231220-b9p1fsadg2
-
MD5
29914c9b705f3446486261c1081aeccf
-
SHA1
787c4a114cb1dc1ab91b93d35154b363778a8414
-
SHA256
7b5f6d8b93d3dbe982f87be3988b7323cba198944e2afdc2b8143347fc17dbcf
-
SHA512
b391917408018b5cf8e99d00462eeb08d9403a037458d0588e29d9d30b3dbd719d7ffa4a0c8118bbd24240c7440ae4edd979760263eb7f82ab33fedb5ac5b801
-
SSDEEP
49152:PYO/q3NpOd3RHwTI8IrJjZ+VGw2PeOq/gf4tZL2w9HLXYHFmErJ28c9:PrEdcprJZ+1tT9LX4N2
Static task
static1
Behavioral task
behavioral1
Sample
7b5f6d8b93d3dbe982f87be3988b7323cba198944e2afdc2b8143347fc17dbcf.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
7b5f6d8b93d3dbe982f87be3988b7323cba198944e2afdc2b8143347fc17dbcf.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
alienbot
http://apk-file.ru.com
Targets
-
-
Target
7b5f6d8b93d3dbe982f87be3988b7323cba198944e2afdc2b8143347fc17dbcf
-
Size
2.1MB
-
MD5
29914c9b705f3446486261c1081aeccf
-
SHA1
787c4a114cb1dc1ab91b93d35154b363778a8414
-
SHA256
7b5f6d8b93d3dbe982f87be3988b7323cba198944e2afdc2b8143347fc17dbcf
-
SHA512
b391917408018b5cf8e99d00462eeb08d9403a037458d0588e29d9d30b3dbd719d7ffa4a0c8118bbd24240c7440ae4edd979760263eb7f82ab33fedb5ac5b801
-
SSDEEP
49152:PYO/q3NpOd3RHwTI8IrJjZ+VGw2PeOq/gf4tZL2w9HLXYHFmErJ28c9:PrEdcprJZ+1tT9LX4N2
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-