General

  • Target

    ec4d56312a968b0077f1110a549ea0e793eb1ad2d33bfb8da7724adfed9e6492

  • Size

    3.4MB

  • Sample

    210415-mq3h5a65bj

  • MD5

    2d35c890c67e816af1a06309b434591b

  • SHA1

    5b15735f0118c6b15fb9acf80c27f195f4da8139

  • SHA256

    ec4d56312a968b0077f1110a549ea0e793eb1ad2d33bfb8da7724adfed9e6492

  • SHA512

    c0e1594912e5ca72375e79decfe7d11df4d535de314d760736884102449aa9b7a371249642ae8314d8989023dc56b40dddfc030f684ff052d111906fe401e995

Malware Config

Extracted

Family

cerberus

C2

http://141.105.65.90/

Targets

    • Target

      ec4d56312a968b0077f1110a549ea0e793eb1ad2d33bfb8da7724adfed9e6492

    • Size

      3.4MB

    • MD5

      2d35c890c67e816af1a06309b434591b

    • SHA1

      5b15735f0118c6b15fb9acf80c27f195f4da8139

    • SHA256

      ec4d56312a968b0077f1110a549ea0e793eb1ad2d33bfb8da7724adfed9e6492

    • SHA512

      c0e1594912e5ca72375e79decfe7d11df4d535de314d760736884102449aa9b7a371249642ae8314d8989023dc56b40dddfc030f684ff052d111906fe401e995

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks