General

  • Target

    Flashplayer.....apk

  • Size

    4.0MB

  • Sample

    210420-aqbs1h1k9a

  • MD5

    b2d77459b93ea208e0567e648f4244d0

  • SHA1

    850db541816850c12e53970c0d4b3f2a36c464ef

  • SHA256

    80b543537957e43444cf5adaf27a152318a97cf115ce97e4e4f104c761257a49

  • SHA512

    93caa5c973879dd8b067cfbc7d19eb1d16a11ebe515a95797c595b2bb2e5b2ab5ad14d45a1c719381be898a7ff67d925363a0999fac0ff668a8857053c113ee4

Malware Config

Extracted

Family

cerberus

C2

http://144.76.80.117

Targets

    • Target

      Flashplayer.....apk

    • Size

      4.0MB

    • MD5

      b2d77459b93ea208e0567e648f4244d0

    • SHA1

      850db541816850c12e53970c0d4b3f2a36c464ef

    • SHA256

      80b543537957e43444cf5adaf27a152318a97cf115ce97e4e4f104c761257a49

    • SHA512

      93caa5c973879dd8b067cfbc7d19eb1d16a11ebe515a95797c595b2bb2e5b2ab5ad14d45a1c719381be898a7ff67d925363a0999fac0ff668a8857053c113ee4

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks