General
-
Target
4f577de33c5c535bb98338839793408b610ea39ab8c0226d579b86e2c68adaa7.zip
-
Size
1.8MB
-
Sample
250326-agfqmsyjw2
-
MD5
9c75778b8316ace4e5a5251db339d3ba
-
SHA1
648bf5d1bbb851de500d306205921ebe6a593d27
-
SHA256
4f577de33c5c535bb98338839793408b610ea39ab8c0226d579b86e2c68adaa7
-
SHA512
d8a92208b404de12490020539dd892a83686e453fcde951e65106094c01d46176470044afe65e1d24276f606bb49b5c9ebe02e388a91be0d77bb1397d9fb157c
-
SSDEEP
49152:JPwQw0RFXBfdFUWAt5c5DpwnSZviV+JCdLlxDkoIU5KTTmpcl:pHJUFt5c5D6SZNCdLvD6pTmpcl
Static task
static1
Behavioral task
behavioral1
Sample
b1cd0d501d8a0022d2ce360cb601f171d8938af613e13814e0af68e79a77c3a9.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b1cd0d501d8a0022d2ce360cb601f171d8938af613e13814e0af68e79a77c3a9.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b1cd0d501d8a0022d2ce360cb601f171d8938af613e13814e0af68e79a77c3a9.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
alienbot
http://ricktreemonkey54st.com
Targets
-
-
Target
b1cd0d501d8a0022d2ce360cb601f171d8938af613e13814e0af68e79a77c3a9.apk
-
Size
1.8MB
-
MD5
184f3e4e3577530c667d122f8ef7ed7f
-
SHA1
f98af84fbe8bf1f9cb4b94eaf730efdca920bbbb
-
SHA256
b1cd0d501d8a0022d2ce360cb601f171d8938af613e13814e0af68e79a77c3a9
-
SHA512
95a39582b06a77fc2036b7d864cbb51adaf809d19528454db2febedbea2bdbeda867a7cae7f4f47d7b081504449f18e3f4c9143821835fd1f74038501e9a580e
-
SSDEEP
49152:st8DZe8Qn/pzcRRFrzrfQhXFFTF+XP5J5boF3EGiNJ/D57hugVd:Res3+Z45J5kF3ziNxNd
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2