General

  • Target

    8e7477bedc4719ba7e16b36d855003344822954c6963511625e6a740eea11650.apk

  • Size

    662KB

  • Sample

    240603-p7adwafb7v

  • MD5

    6a006852e82627d329d50d088243158e

  • SHA1

    dba0c779f195690315e45a9efc941caa0232afdb

  • SHA256

    2c054cac2457e115bfd419be7ccecff5feba17a974e1a65b1b5a94129ec4d80f

  • SHA512

    537e0af67153ce92a1f9016e919b57fbebe7062d1fd098c375b5a5384174f16c974cd4c489028f7ab0afefb206d5564e7b663685cbc5ef944994673a7d2b1896

  • SSDEEP

    12288:FDOl+dl8W7FaigCPnOuj/8KmC/ab5KbA7criWQX2xpJd9c:FDe+UW7Fpv+KR/aVK07q/QmxpJd9c

Malware Config

Extracted

Family

alienbot

C2

http://0lkoypi8ckkv9e.xyz

Targets

    • Target

      8e7477bedc4719ba7e16b36d855003344822954c6963511625e6a740eea11650.apk

    • Size

      662KB

    • MD5

      6a006852e82627d329d50d088243158e

    • SHA1

      dba0c779f195690315e45a9efc941caa0232afdb

    • SHA256

      2c054cac2457e115bfd419be7ccecff5feba17a974e1a65b1b5a94129ec4d80f

    • SHA512

      537e0af67153ce92a1f9016e919b57fbebe7062d1fd098c375b5a5384174f16c974cd4c489028f7ab0afefb206d5564e7b663685cbc5ef944994673a7d2b1896

    • SSDEEP

      12288:FDOl+dl8W7FaigCPnOuj/8KmC/ab5KbA7criWQX2xpJd9c:FDe+UW7Fpv+KR/aVK07q/QmxpJd9c

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Prevents application removal

      Application may abuse the framework's APIs to prevent removal.

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Mobile v15

Tasks