General

  • Target

    22156d5d8b763a1f10bce4fe14d13ad98a73522ad9da8d923e0d3b1b0dd04655.bin

  • Size

    1.6MB

  • Sample

    250121-12nvvstkbs

  • MD5

    48e697323a0779f4e0e7b0fff8618400

  • SHA1

    3c3172d219d942dd7636f7373f01c9fd38141211

  • SHA256

    22156d5d8b763a1f10bce4fe14d13ad98a73522ad9da8d923e0d3b1b0dd04655

  • SHA512

    37599aadb30b31d10e2e5dcbfa138d16b0f9c47b02d0ac49f5b6bd559cc8dea6399d777aa3382b7588b64c0c574acce570326afa398086d89bebd8b6902d9771

  • SSDEEP

    24576:hcycIR0aeP9Ji8GU6ICuVOFlnlUa8vBQ6LBUAXhQLh7guvqYanpNwYYT8ABwR:hcyc3WU6PuwF216yhohE6qYipNwYYTpK

Malware Config

Extracted

Family

alienbot

C2

http://akrepbaba323.net

rc4.plain

Extracted

Family

alienbot

C2

http://akrepbaba323.net

Targets

    • Target

      22156d5d8b763a1f10bce4fe14d13ad98a73522ad9da8d923e0d3b1b0dd04655.bin

    • Size

      1.6MB

    • MD5

      48e697323a0779f4e0e7b0fff8618400

    • SHA1

      3c3172d219d942dd7636f7373f01c9fd38141211

    • SHA256

      22156d5d8b763a1f10bce4fe14d13ad98a73522ad9da8d923e0d3b1b0dd04655

    • SHA512

      37599aadb30b31d10e2e5dcbfa138d16b0f9c47b02d0ac49f5b6bd559cc8dea6399d777aa3382b7588b64c0c574acce570326afa398086d89bebd8b6902d9771

    • SSDEEP

      24576:hcycIR0aeP9Ji8GU6ICuVOFlnlUa8vBQ6LBUAXhQLh7guvqYanpNwYYT8ABwR:hcyc3WU6PuwF216yhohE6qYipNwYYTpK

    • Alienbot

      Alienbot is a fork of Cerberus banker first seen in January 2020.

    • Alienbot family

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus family

    • Cerberus payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks