General

  • Target

    113a264aa23669fffa61b23947f3341fbf6288954a4aed0f5face2e8d4df8bd9

  • Size

    3.2MB

  • Sample

    210415-sx5h7zmpe6

  • MD5

    c4cb0bc55e2c5d8effd47b64ccb05bfd

  • SHA1

    d46a68e7e63d6227e9378bdba4898d827ebef496

  • SHA256

    113a264aa23669fffa61b23947f3341fbf6288954a4aed0f5face2e8d4df8bd9

  • SHA512

    6fd331f696e451a346a15b4c8c0ceaf8e1957a0d649fc7bf44305012d15a50a4876ab92a92f3f0647ddef85f6287cc98e0dd9966b7da3ad0a8ee6e2db5103143

Malware Config

Extracted

Family

cerberus

C2

http://185.206.147.229

Targets

    • Target

      113a264aa23669fffa61b23947f3341fbf6288954a4aed0f5face2e8d4df8bd9

    • Size

      3.2MB

    • MD5

      c4cb0bc55e2c5d8effd47b64ccb05bfd

    • SHA1

      d46a68e7e63d6227e9378bdba4898d827ebef496

    • SHA256

      113a264aa23669fffa61b23947f3341fbf6288954a4aed0f5face2e8d4df8bd9

    • SHA512

      6fd331f696e451a346a15b4c8c0ceaf8e1957a0d649fc7bf44305012d15a50a4876ab92a92f3f0647ddef85f6287cc98e0dd9966b7da3ad0a8ee6e2db5103143

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks