Resubmissions

26-07-2021 19:35

210726-gjbsdmhfz2 10

26-07-2021 19:14

210726-p36gqxdgfj 10

General

  • Target

    PREMIUM_IFSA_18_.apk

  • Size

    4.0MB

  • Sample

    210726-gjbsdmhfz2

  • MD5

    63bc0255d48bf9bb567361f52dcda55e

  • SHA1

    6b7d645160f0a7e880eb46e3eb8cdaef88c4314b

  • SHA256

    283b3426a60d0d226efe7903732bb9185c68fb7ef81088c47b75c1f3621bf461

  • SHA512

    217ab52a16b115b0f9e2011518092a489c0413c2b5035662229af322adf42268a6bce13b17ab5b86fc6df4962ccce33e76aa22967b9dbf197b4246ba8317bb1f

Malware Config

Targets

    • Target

      PREMIUM_IFSA_18_.apk

    • Size

      4.0MB

    • MD5

      63bc0255d48bf9bb567361f52dcda55e

    • SHA1

      6b7d645160f0a7e880eb46e3eb8cdaef88c4314b

    • SHA256

      283b3426a60d0d226efe7903732bb9185c68fb7ef81088c47b75c1f3621bf461

    • SHA512

      217ab52a16b115b0f9e2011518092a489c0413c2b5035662229af322adf42268a6bce13b17ab5b86fc6df4962ccce33e76aa22967b9dbf197b4246ba8317bb1f

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks