General

  • Target

    793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.bin

  • Size

    3.1MB

  • Sample

    240818-1ytlyazfnn

  • MD5

    65e4932b64e9371109d5c59d6d7ba457

  • SHA1

    21766759eea069df8211d15ef4eaa618419e87b7

  • SHA256

    793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da

  • SHA512

    fe91b56ad629f8ebdea5d126b53a8c959aa4d7283c8ab3d7b97adf9d9cf1801c8a36d4bda7009aed550b99cbba3429b5fb52ecb1f92d96ac1160504ab4bcc700

  • SSDEEP

    98304:x+n2Ijfsx9IwSvVuHbDh3/C/u9BlCgfw39x:+2I2GwSv2hzgp3

Malware Config

Extracted

Family

alienbot

C2

http://kvq9t8pe7ssjps8p4iqj.xyz

Targets

    • Target

      793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da.bin

    • Size

      3.1MB

    • MD5

      65e4932b64e9371109d5c59d6d7ba457

    • SHA1

      21766759eea069df8211d15ef4eaa618419e87b7

    • SHA256

      793664621e075efca72171d04ad0b0f47f464e36e637c1f23a9ae7087eb344da

    • SHA512

      fe91b56ad629f8ebdea5d126b53a8c959aa4d7283c8ab3d7b97adf9d9cf1801c8a36d4bda7009aed550b99cbba3429b5fb52ecb1f92d96ac1160504ab4bcc700

    • SSDEEP

      98304:x+n2Ijfsx9IwSvVuHbDh3/C/u9BlCgfw39x:+2I2GwSv2hzgp3

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks