General

  • Target

    FAST.apk

  • Size

    3.1MB

  • Sample

    210807-cdhjwhck66

  • MD5

    d38149d82ed66c24d5acd62ad4bfc3b3

  • SHA1

    74c318254e3f59eb83ef22e6dffe024ff9397b34

  • SHA256

    068776971541ada38dea1e7bf666d877bc0e67785e854205f84385f14f5c4dea

  • SHA512

    268eed1d17be3bb02bc624abeaf06bedaa5fba8061856560a8aea31fcf0b72116c8c74f6b226756053552215c49c36bd84d551cab9e72642bb841f7eb3a3ff22

Malware Config

Extracted

Family

cerberus

C2

http://72.10.160.51

Targets

    • Target

      FAST.apk

    • Size

      3.1MB

    • MD5

      d38149d82ed66c24d5acd62ad4bfc3b3

    • SHA1

      74c318254e3f59eb83ef22e6dffe024ff9397b34

    • SHA256

      068776971541ada38dea1e7bf666d877bc0e67785e854205f84385f14f5c4dea

    • SHA512

      268eed1d17be3bb02bc624abeaf06bedaa5fba8061856560a8aea31fcf0b72116c8c74f6b226756053552215c49c36bd84d551cab9e72642bb841f7eb3a3ff22

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad

      suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad

    • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

      suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks