General

  • Target

    d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.bin

  • Size

    2.0MB

  • Sample

    240708-1x73yatdkb

  • MD5

    985c89437897c42ca4effbdd8eeaa481

  • SHA1

    01d130825c90e11cdcbb1c7ade1e6fbed08683e4

  • SHA256

    d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697

  • SHA512

    9fd3198dc47a70c000c884f5c71fb95f0859e4fc8d1096d156c7c32206601405f50281491599109291ff474aa10253c6c0a9fa1a3844a67da5dbb7c466840e6f

  • SSDEEP

    49152:G6EF5D4k36a68WhgHLH4HPvd3B2G2Ryuzw0rcJ:GH/4k36yWhY74Ht3B2RRSJ

Malware Config

Extracted

Family

alienbot

C2

http://yawyawvaryyaaaa.com

rc4.plain

Extracted

Family

alienbot

C2

http://yawyawvaryyaaaa.com

Targets

    • Target

      d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697.bin

    • Size

      2.0MB

    • MD5

      985c89437897c42ca4effbdd8eeaa481

    • SHA1

      01d130825c90e11cdcbb1c7ade1e6fbed08683e4

    • SHA256

      d98ac479067b6c7ac6076ce0ba3a62ac0f30c5c85ea2a774791a50aace4ea697

    • SHA512

      9fd3198dc47a70c000c884f5c71fb95f0859e4fc8d1096d156c7c32206601405f50281491599109291ff474aa10253c6c0a9fa1a3844a67da5dbb7c466840e6f

    • SSDEEP

      49152:G6EF5D4k36a68WhgHLH4HPvd3B2G2Ryuzw0rcJ:GH/4k36yWhY74Ht3B2RRSJ

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus payload

    • Removes its main activity from the application launcher

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks