General

  • Target

    Android_build_obf (1).apk

  • Size

    3.9MB

  • Sample

    210728-5qh1e6a9t6

  • MD5

    df178569159212fac165b11e04cba95f

  • SHA1

    5ebefc95b1f35015ab28cd4023cb2b2acbc345aa

  • SHA256

    e2cce82b8022513f9786d81bc9c665193f3f98b6f19444415f7416c5676bc65f

  • SHA512

    145011ef5315401ded02c93af21c814677f3a542743e9a27265cef29cd4bd3be4bafd38fc0db1f93c57069c3a517944d3447c6d0bde98ec290ee52e3d1efb00f

Malware Config

Targets

    • Target

      Android_build_obf (1).apk

    • Size

      3.9MB

    • MD5

      df178569159212fac165b11e04cba95f

    • SHA1

      5ebefc95b1f35015ab28cd4023cb2b2acbc345aa

    • SHA256

      e2cce82b8022513f9786d81bc9c665193f3f98b6f19444415f7416c5676bc65f

    • SHA512

      145011ef5315401ded02c93af21c814677f3a542743e9a27265cef29cd4bd3be4bafd38fc0db1f93c57069c3a517944d3447c6d0bde98ec290ee52e3d1efb00f

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks