General

  • Target

    Android build_obf (1).apk

  • Size

    3.0MB

  • Sample

    210805-fcl6l7hx2s

  • MD5

    547976419f1491f829726b64625e8eb8

  • SHA1

    2a14935a3d54cf50677dfb1f32183e9990af5360

  • SHA256

    1214e91cec221cd5bdb3dd56bc28dacc327046f6739ff329afd59a4bef0c3881

  • SHA512

    6618ffaec2a73db2c2421ba5845ee93e1af6bf19a40bfabfc2853c9b1e7f435e3f3f7e9388b8b5c296c1a162f787df942503e813467f699bddbf6a1000c05a71

Malware Config

Extracted

Family

cerberus

C2

http://144.126.147.6

Targets

    • Target

      Android build_obf (1).apk

    • Size

      3.0MB

    • MD5

      547976419f1491f829726b64625e8eb8

    • SHA1

      2a14935a3d54cf50677dfb1f32183e9990af5360

    • SHA256

      1214e91cec221cd5bdb3dd56bc28dacc327046f6739ff329afd59a4bef0c3881

    • SHA512

      6618ffaec2a73db2c2421ba5845ee93e1af6bf19a40bfabfc2853c9b1e7f435e3f3f7e9388b8b5c296c1a162f787df942503e813467f699bddbf6a1000c05a71

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks