General

  • Target

    3fdc1f2f1af947fea9f7f59d688c9ec4_JaffaCakes118

  • Size

    3.7MB

  • Sample

    240330-t75l8sae54

  • MD5

    3fdc1f2f1af947fea9f7f59d688c9ec4

  • SHA1

    2415e26161139c2a86b2d2719bd922b9e8d9fb20

  • SHA256

    1c2019d89c3c64af68eeaa8cf75612a1740e19b1fe45609bd06993ff07bbc31a

  • SHA512

    f5ff690bf0413482d4f4d622f946661dc57234d19f3db58f5848155c0b0522a14956d8e5ff8a7ded6348edb74c24ab7a7940be4dde77f6dcbce7d560ab9a14f2

  • SSDEEP

    98304:0frySSkNT7K4ClnZ5WEyYhBOR9h7pjjQyGntFoQrg+lN+p:CGSi441hBOd72oQZMp

Malware Config

Extracted

Family

alienbot

C2

http://vuukm068z3jj8gixslvk.xyz

Targets

    • Target

      3fdc1f2f1af947fea9f7f59d688c9ec4_JaffaCakes118

    • Size

      3.7MB

    • MD5

      3fdc1f2f1af947fea9f7f59d688c9ec4

    • SHA1

      2415e26161139c2a86b2d2719bd922b9e8d9fb20

    • SHA256

      1c2019d89c3c64af68eeaa8cf75612a1740e19b1fe45609bd06993ff07bbc31a

    • SHA512

      f5ff690bf0413482d4f4d622f946661dc57234d19f3db58f5848155c0b0522a14956d8e5ff8a7ded6348edb74c24ab7a7940be4dde77f6dcbce7d560ab9a14f2

    • SSDEEP

      98304:0frySSkNT7K4ClnZ5WEyYhBOR9h7pjjQyGntFoQrg+lN+p:CGSi441hBOd72oQZMp

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks