General
-
Target
8c8806de862133ede2eddd2a82751af95eb39e0dd732478cc70baa5bb2d6ebdf
-
Size
2.1MB
-
Sample
231220-hg28msgbem
-
MD5
c4a118a1dd6dd7182329449cf4faa60a
-
SHA1
a36de5592e735ee578c24aedd0883e72c8eb95a5
-
SHA256
8c8806de862133ede2eddd2a82751af95eb39e0dd732478cc70baa5bb2d6ebdf
-
SHA512
77ade4851913d397ea238f60e42c7cdcbcadfc44ad67c6bdb805bf83e2b6146785a368f79ed8226489d86d0074fc5bd36c769f6ab2c87a21ec28a77a9f888ef4
-
SSDEEP
49152:LYYyEq32TvbIQ+cXIfivCm1Qh2PwYQyh4FYl0zfHFmErH8e/G:LYgTvn0tyh4Q6NS
Static task
static1
Behavioral task
behavioral1
Sample
8c8806de862133ede2eddd2a82751af95eb39e0dd732478cc70baa5bb2d6ebdf.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8c8806de862133ede2eddd2a82751af95eb39e0dd732478cc70baa5bb2d6ebdf.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
alienbot
http://oylebibokabattimben.com
Targets
-
-
Target
8c8806de862133ede2eddd2a82751af95eb39e0dd732478cc70baa5bb2d6ebdf
-
Size
2.1MB
-
MD5
c4a118a1dd6dd7182329449cf4faa60a
-
SHA1
a36de5592e735ee578c24aedd0883e72c8eb95a5
-
SHA256
8c8806de862133ede2eddd2a82751af95eb39e0dd732478cc70baa5bb2d6ebdf
-
SHA512
77ade4851913d397ea238f60e42c7cdcbcadfc44ad67c6bdb805bf83e2b6146785a368f79ed8226489d86d0074fc5bd36c769f6ab2c87a21ec28a77a9f888ef4
-
SSDEEP
49152:LYYyEq32TvbIQ+cXIfivCm1Qh2PwYQyh4FYl0zfHFmErH8e/G:LYgTvn0tyh4Q6NS
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-