General

  • Target

    c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3.bin

  • Size

    4.4MB

  • Sample

    240908-2cdt2aybqn

  • MD5

    551fb95cfe9ddf46002815def4cf3fc0

  • SHA1

    0990ef0cd4c4afe272b01c57a99fe4247c2de1e5

  • SHA256

    c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3

  • SHA512

    2e33b61f7633dfb94e9e57da7bfff84f79bad7e1204275c7f421a819beff44775d8c6ee3ef73e7879a1d3bb585b67a64a81ffeaf1c93be43afc3eab4e7b7799e

  • SSDEEP

    98304:4F0w68qGhQT4gTChsSbxKRlPIF/0/w9KZigNFTUgIvrxowNQdKBX:UAahQTB+hsSbyxACig3svtdmK

Malware Config

Extracted

Family

alienbot

C2

http://1vq90ijfs1rqa6ngork8.xyz

Targets

    • Target

      c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3.bin

    • Size

      4.4MB

    • MD5

      551fb95cfe9ddf46002815def4cf3fc0

    • SHA1

      0990ef0cd4c4afe272b01c57a99fe4247c2de1e5

    • SHA256

      c4f8d2049905872034b86f836fcdee717e874ca5544393ef571e009c44cfc2a3

    • SHA512

      2e33b61f7633dfb94e9e57da7bfff84f79bad7e1204275c7f421a819beff44775d8c6ee3ef73e7879a1d3bb585b67a64a81ffeaf1c93be43afc3eab4e7b7799e

    • SSDEEP

      98304:4F0w68qGhQT4gTChsSbxKRlPIF/0/w9KZigNFTUgIvrxowNQdKBX:UAahQTB+hsSbyxACig3svtdmK

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks