General

  • Target

    AndrodUPDate.apk

  • Size

    3.7MB

  • Sample

    210730-w7tkqx1m3n

  • MD5

    d18981790206430219be49836d050774

  • SHA1

    8a4c43ad5efa81ce571fb3547e03f22118f55f0e

  • SHA256

    f2aa11a96eb88c411fc47687886f8bda6de62294d5c1ec92947d5a1ef3b468ba

  • SHA512

    a93a86e85431a3b5ebea3253087e761f5d79d3674f237fde2b9dfd4270a65e60123e2f8dab77b8fb9cbc04021e7a35c2218867e2eae1a85cc01a72d249f06272

Malware Config

Targets

    • Target

      AndrodUPDate.apk

    • Size

      3.7MB

    • MD5

      d18981790206430219be49836d050774

    • SHA1

      8a4c43ad5efa81ce571fb3547e03f22118f55f0e

    • SHA256

      f2aa11a96eb88c411fc47687886f8bda6de62294d5c1ec92947d5a1ef3b468ba

    • SHA512

      a93a86e85431a3b5ebea3253087e761f5d79d3674f237fde2b9dfd4270a65e60123e2f8dab77b8fb9cbc04021e7a35c2218867e2eae1a85cc01a72d249f06272

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks