General

  • Target

    Android-Update (1).apk

  • Size

    3.9MB

  • Sample

    210730-eym2tde95e

  • MD5

    333f95529ca58b782dafd1acdafd29ea

  • SHA1

    12e12ab7bdd439837dd483b8a33d5b75767c085e

  • SHA256

    df6be1f67e05ad5cefa8905a2dbb51a8e47790c349502c6b1e0701f2345d0720

  • SHA512

    82b8b388b120819b478c6d9cd691311ff328acdce7d582abcafeca47e5eea20d2669bc5776082df5c99c1c345b8a063479a6a424e8963fe1923887c98d5b175d

Malware Config

Targets

    • Target

      Android-Update (1).apk

    • Size

      3.9MB

    • MD5

      333f95529ca58b782dafd1acdafd29ea

    • SHA1

      12e12ab7bdd439837dd483b8a33d5b75767c085e

    • SHA256

      df6be1f67e05ad5cefa8905a2dbb51a8e47790c349502c6b1e0701f2345d0720

    • SHA512

      82b8b388b120819b478c6d9cd691311ff328acdce7d582abcafeca47e5eea20d2669bc5776082df5c99c1c345b8a063479a6a424e8963fe1923887c98d5b175d

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks