General
-
Target
7de0af643b9888e7f2f9009b1d40d9b8bb445b343db5d30c608c0dec3b25311e
-
Size
2.1MB
-
Sample
231220-czleysbfd7
-
MD5
8d87534c81183f667ebae7692fe1f6f2
-
SHA1
d9c1722b76094fbf0b7d2b0cdedc48e21e0e23c8
-
SHA256
7de0af643b9888e7f2f9009b1d40d9b8bb445b343db5d30c608c0dec3b25311e
-
SHA512
09929777ea6cc452eaf35a937f9f92efd83d4d7c9f706ee67587e0193a531a882870bc6b91b5c7498e8e15ec07eb832c5881fff7bdc53273fe1054441a94cb10
-
SSDEEP
49152:MXZryfKnpo9UxQABmHfsyP+tNCxeE+yGJuyDh86xmdQgRwzl3M:Mprzn+QRm/syP+t8xOyGQyN86YQjM
Static task
static1
Behavioral task
behavioral1
Sample
7de0af643b9888e7f2f9009b1d40d9b8bb445b343db5d30c608c0dec3b25311e.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
7de0af643b9888e7f2f9009b1d40d9b8bb445b343db5d30c608c0dec3b25311e.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
alienbot
http://ukalasey.com
Targets
-
-
Target
7de0af643b9888e7f2f9009b1d40d9b8bb445b343db5d30c608c0dec3b25311e
-
Size
2.1MB
-
MD5
8d87534c81183f667ebae7692fe1f6f2
-
SHA1
d9c1722b76094fbf0b7d2b0cdedc48e21e0e23c8
-
SHA256
7de0af643b9888e7f2f9009b1d40d9b8bb445b343db5d30c608c0dec3b25311e
-
SHA512
09929777ea6cc452eaf35a937f9f92efd83d4d7c9f706ee67587e0193a531a882870bc6b91b5c7498e8e15ec07eb832c5881fff7bdc53273fe1054441a94cb10
-
SSDEEP
49152:MXZryfKnpo9UxQABmHfsyP+tNCxeE+yGJuyDh86xmdQgRwzl3M:Mprzn+QRm/syP+t8xOyGQyN86YQjM
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-