General

  • Target

    AndrodYazlm.apk

  • Size

    3.4MB

  • Sample

    210730-elr4nmgy4j

  • MD5

    7a878c0c85c846a2d65de3cae8ad836f

  • SHA1

    21757800efeafa642d40d89f4d55c3af6428d64b

  • SHA256

    39d3fc9a1f49d010494b593250637ffdafdc89975a86e4e4d44d861e4515f953

  • SHA512

    6c30accaec118485b84eca10369c47fe7dd54cabb6abd01b1b8a24fa02d31ace440c7db47098cf2b6a30b6d65460dd012fa90b3e5e6b31918084b0fc39cecd44

Malware Config

Targets

    • Target

      AndrodYazlm.apk

    • Size

      3.4MB

    • MD5

      7a878c0c85c846a2d65de3cae8ad836f

    • SHA1

      21757800efeafa642d40d89f4d55c3af6428d64b

    • SHA256

      39d3fc9a1f49d010494b593250637ffdafdc89975a86e4e4d44d861e4515f953

    • SHA512

      6c30accaec118485b84eca10369c47fe7dd54cabb6abd01b1b8a24fa02d31ace440c7db47098cf2b6a30b6d65460dd012fa90b3e5e6b31918084b0fc39cecd44

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks