General
-
Target
612065452c641f2400a1626b65e0b72f350906176785fccba1db7673a8607257.zip
-
Size
1.4MB
-
Sample
250326-ftexrs1mw5
-
MD5
57cc7c751d34c07016e25a60bf69f03a
-
SHA1
84561fe3f72c4eee090147d1563ce5965014caa9
-
SHA256
612065452c641f2400a1626b65e0b72f350906176785fccba1db7673a8607257
-
SHA512
4f4c32f00cdc0b77efda8c73650303e9ce694fa4a699509661fd2312962e2ec410a01aa5893689b967af4a84bd0683c3ededfdd2ed73fd5cf76aee893e2cfc2a
-
SSDEEP
24576:Z5ovcsY77m25PF+RvBfMGIb6hGs/i4gyiDqjB4PFa3+iVByyZ09yR6o3iF/Fwc+J:IvcsY7m25t2BfMGBhGZPyiDdFa3HByxK
Static task
static1
Behavioral task
behavioral1
Sample
dafc457d7005b4cbdadf7c0060bc8350e83306a564dc279feb701e55d1c13532.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
dafc457d7005b4cbdadf7c0060bc8350e83306a564dc279feb701e55d1c13532.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
dafc457d7005b4cbdadf7c0060bc8350e83306a564dc279feb701e55d1c13532.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
alienbot
http://odricatt.live
Targets
-
-
Target
dafc457d7005b4cbdadf7c0060bc8350e83306a564dc279feb701e55d1c13532.apk
-
Size
1.5MB
-
MD5
8ca18d9c60d1bf540877f99b3569943f
-
SHA1
ad201003c45f45147a3745100b47ef4acf3ce8c6
-
SHA256
dafc457d7005b4cbdadf7c0060bc8350e83306a564dc279feb701e55d1c13532
-
SHA512
5d8469559f1eea724a5d703fa49e5e2059653e52c8b7ebe91c6fac3c1cc8421379b5db5812ae78377b6ad8f3e9ab6ba018f3a7724f2fb4019a66d9b1c57e51ff
-
SSDEEP
49152:MgfQ7jSRLDPlu4qgklVASsh9vgrlOx8hRfQ7tNwPHK:MgfQ8HojhmhFg5iMfQ7vwPHK
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Cerberus payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2