Analysis

  • max time kernel
    3654780s
  • max time network
    60s
  • platform
    android_x86
  • resource
    android-x86_arm
  • submitted
    16-04-2021 08:40

General

  • Target

    bac498dd4ada78968fb82f772f1529352d72e52073fe2dbddc232be7c3f3ec14.apk

  • Size

    3.4MB

  • MD5

    aa7c5edc939599bc70f451eb4e125a3b

  • SHA1

    a702ffdc2edad2d8b3b45ec4977a12710ae9b9fc

  • SHA256

    bac498dd4ada78968fb82f772f1529352d72e52073fe2dbddc232be7c3f3ec14

  • SHA512

    8e20f7035c5aac6857b3b065fee715974eb212b9f7a65bb3aa741cc8ad6898d6fbd58808665b8b4468f7f5faa1aa0a12f91892f87f60b8f5a599cd3cb18248bd

Malware Config

Extracted

Family

cerberus

C2

http://198.144.191.142/

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses reflection 27 IoCs

Processes

  • dwarf.liar.trust
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Uses reflection
    PID:4676

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads