General
-
Target
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601
-
Size
1.8MB
-
Sample
231220-h6pzlsceb5
-
MD5
88982178e9df34bfcfd0b03d73c8c713
-
SHA1
f33bcc2881f2fa274d2205dc23648449ceb23f61
-
SHA256
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601
-
SHA512
3b85142303d1607e718b4658eed2ede5a3695af5a193d7a3f7c529df39d45fb9cd873989de171139296ef52ad0aeecc0507681790a858c77aa6cf77cb20cf910
-
SSDEEP
49152:fml2hgZfDc2MsSeqW3u2Y0Cr6s1Bm2SOvxoewADrU1PE9sS:e2sKsDuQCrJLmnOYAvCPQsS
Static task
static1
Behavioral task
behavioral1
Sample
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
alienbot
http://18likveletcalistiranusom.com
Targets
-
-
Target
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601
-
Size
1.8MB
-
MD5
88982178e9df34bfcfd0b03d73c8c713
-
SHA1
f33bcc2881f2fa274d2205dc23648449ceb23f61
-
SHA256
8ef42748d57d163c6c8f519cd663b6c8ef28d2f1afa527716cd2d40f4c4f5601
-
SHA512
3b85142303d1607e718b4658eed2ede5a3695af5a193d7a3f7c529df39d45fb9cd873989de171139296ef52ad0aeecc0507681790a858c77aa6cf77cb20cf910
-
SSDEEP
49152:fml2hgZfDc2MsSeqW3u2Y0Cr6s1Bm2SOvxoewADrU1PE9sS:e2sKsDuQCrJLmnOYAvCPQsS
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-