General

  • Target

    0e1b38ce12e756a2a57c886233f6d25734b20115ea8f2d179d48560c311a2a2c.bin

  • Size

    4.0MB

  • Sample

    240824-1xbpqssbka

  • MD5

    f8c34812ed3025d042ed634ae40b7ba8

  • SHA1

    c760498b03cd0c90ce5152b0e6b9aae7933f3449

  • SHA256

    0e1b38ce12e756a2a57c886233f6d25734b20115ea8f2d179d48560c311a2a2c

  • SHA512

    2570ea2c629b65e0b0a0d0d4ea32dced94d17a145c3366d99c37f4d52e2b048671712d2e6364b7a84e02ae029978c83226229b4fa6bbcae38c6da0ee5e46bc10

  • SSDEEP

    98304:d4j9eQD/FouBzkEtlnLMgiuKrUD/c/s93c1gNFTUgIB0rKk+ayk:CPCi5nrvw+a1g3sBBT9k

Malware Config

Extracted

Family

alienbot

C2

http://kvq9t8pe7ssjps8p4iqj.xyz

Targets

    • Target

      0e1b38ce12e756a2a57c886233f6d25734b20115ea8f2d179d48560c311a2a2c.bin

    • Size

      4.0MB

    • MD5

      f8c34812ed3025d042ed634ae40b7ba8

    • SHA1

      c760498b03cd0c90ce5152b0e6b9aae7933f3449

    • SHA256

      0e1b38ce12e756a2a57c886233f6d25734b20115ea8f2d179d48560c311a2a2c

    • SHA512

      2570ea2c629b65e0b0a0d0d4ea32dced94d17a145c3366d99c37f4d52e2b048671712d2e6364b7a84e02ae029978c83226229b4fa6bbcae38c6da0ee5e46bc10

    • SSDEEP

      98304:d4j9eQD/FouBzkEtlnLMgiuKrUD/c/s93c1gNFTUgIB0rKk+ayk:CPCi5nrvw+a1g3sBBT9k

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks