Analysis

  • max time kernel
    4008481s
  • max time network
    139s
  • platform
    android_x86
  • resource
    android-x86_arm
  • submitted
    20-04-2021 10:53

General

  • Target

    Flashplayer.....apk

  • Size

    4.0MB

  • MD5

    b2d77459b93ea208e0567e648f4244d0

  • SHA1

    850db541816850c12e53970c0d4b3f2a36c464ef

  • SHA256

    80b543537957e43444cf5adaf27a152318a97cf115ce97e4e4f104c761257a49

  • SHA512

    93caa5c973879dd8b067cfbc7d19eb1d16a11ebe515a95797c595b2bb2e5b2ab5ad14d45a1c719381be898a7ff67d925363a0999fac0ff668a8857053c113ee4

Malware Config

Extracted

Family

cerberus

C2

http://144.76.80.117

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Tries to add a device administrator. 1 IoCs
  • Uses reflection 27 IoCs

Processes

  • weather.machine.culture
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Tries to add a device administrator.
    • Uses reflection
    PID:4703

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads