General
-
Target
93d77923edd54c80a9073ab529daa34e275334eea747daf3f496bce114116545
-
Size
2.5MB
-
Sample
231220-j5ww7seeg2
-
MD5
53cfbd65d6f0beec535d5c11b7b8ee68
-
SHA1
0e10eef11b6b6e9c1b81a0719f64ef4a85d68f8a
-
SHA256
93d77923edd54c80a9073ab529daa34e275334eea747daf3f496bce114116545
-
SHA512
92d8a47acf00065842903bab4ba4036e4b579c82f8215279a2e7fb55678b91490cfa6b7f2f52edcd902151ce80e30ca1ca28f886ac09267b1969ef7285e20061
-
SSDEEP
49152:/fTEOHkiXkXbOrT8KnIjyKVGwG2T0eZrmNGKqviEQxriESscXHKaj9aaxmIqmgLF:nTwbATZOkw0GmYKpZ6pfYLNmIJ3Rf
Static task
static1
Behavioral task
behavioral1
Sample
93d77923edd54c80a9073ab529daa34e275334eea747daf3f496bce114116545.apk
Behavioral task
behavioral2
Sample
93d77923edd54c80a9073ab529daa34e275334eea747daf3f496bce114116545.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
alienbot
http://brobenim9.site
Targets
-
-
Target
93d77923edd54c80a9073ab529daa34e275334eea747daf3f496bce114116545
-
Size
2.5MB
-
MD5
53cfbd65d6f0beec535d5c11b7b8ee68
-
SHA1
0e10eef11b6b6e9c1b81a0719f64ef4a85d68f8a
-
SHA256
93d77923edd54c80a9073ab529daa34e275334eea747daf3f496bce114116545
-
SHA512
92d8a47acf00065842903bab4ba4036e4b579c82f8215279a2e7fb55678b91490cfa6b7f2f52edcd902151ce80e30ca1ca28f886ac09267b1969ef7285e20061
-
SSDEEP
49152:/fTEOHkiXkXbOrT8KnIjyKVGwG2T0eZrmNGKqviEQxriESscXHKaj9aaxmIqmgLF:nTwbATZOkw0GmYKpZ6pfYLNmIJ3Rf
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Cerberus payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-