General
-
Target
e46ec351a02354a503d12124d430d6d3dc62f98d2410e8ac54ad4ff0ef4c775c.zip
-
Size
282KB
-
Sample
250327-rtn18avq13
-
MD5
2de48d97de9584fe552ade17dd132c8c
-
SHA1
4824eac883d3326732ed592ce9d2a3d9367c2fe1
-
SHA256
e46ec351a02354a503d12124d430d6d3dc62f98d2410e8ac54ad4ff0ef4c775c
-
SHA512
e467e682dfd15dac906734e8a39bcadf4e1bb6cd49f9adaf080e60d7b258d06522d3da5a58f1260ab64cc662f100cd3d5050ecee2ca635e9ce9c59bb05b1ee5f
-
SSDEEP
6144:+SrgOtYEK/quoe9t0AbfUisaHAeB41j2J8dULCSlIYZ3DyVrp8:+SrgOijCuP9tfFsaLZydaCSCiuVF8
Behavioral task
behavioral1
Sample
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
alienbot
http://abindizzobremin.tk
Targets
-
-
Target
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad.apk
-
Size
311KB
-
MD5
c86f20dc93c1d5427ae149ce89e764d2
-
SHA1
c0f961ba8df77cfe6848b6679b94f398bf2e5053
-
SHA256
1236be7fd1385b2543205404d96f37bded28a626d27d1e0a1dd4c570ef6dd2ad
-
SHA512
d8a283b5a5225ddfac96c1be5c21ea90b32df70d5639392c8afbc20d675f838459fe0aa428baf7db7b44beab28006df8801d700190351ae28b12e738acc588aa
-
SSDEEP
6144:x19xxvzXZYfrhtyjHpj1V6HGdVDse3U0ls6yiAZ4oFT8A9K9LhRFYwbOh4hZm:Rxxv5jHRSmdJse3UiBgTR9K9LnFYwb8/
-
Alienbot
Alienbot is a fork of Cerberus banker first seen in January 2020.
-
Alienbot family
-
Cerberus family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1