Analysis

  • max time kernel
    4020815s
  • max time network
    65s
  • platform
    android_x86_64
  • resource
    android-x86_64
  • submitted
    20-04-2021 14:20

General

  • Target

    e18c854179780dac39ee884f1e4258cc7890f8667edc88b3b107940b4f160021.apk

  • Size

    3.5MB

  • MD5

    5f0ccd770e9808bf740c5bf529b50fd8

  • SHA1

    b2137b6f49460024cdea143e5cf3f92cedd694d4

  • SHA256

    e18c854179780dac39ee884f1e4258cc7890f8667edc88b3b107940b4f160021

  • SHA512

    4dc3e729d00b3c0a777fbf3882f22814c8e6246e72eb8c3a386e4f79b704ea5d9f5d6ca1232071c6889d1b9f33252794540e34884f6ee6e2c4ba70536b128ae1

Malware Config

Extracted

Family

cerberus

C2

http://45.153.185.33/

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses reflection 27 IoCs

Processes

  • mystery.worry.father
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Uses reflection
    PID:3614

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads