Analysis

  • max time kernel
    2146781s
  • max time network
    179s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    14-10-2021 17:58

General

  • Target

    Androidupdate.apk

  • Size

    2.6MB

  • MD5

    eec0c54b5ed67b3932cf19b013489be3

  • SHA1

    398f24c3fac339ff67c539da31ca0111eea6b596

  • SHA256

    7e4fa9aeb659a9524f5b2ba4df8d806c25fc6906a6470a6911848e67905a0171

  • SHA512

    9daf7307d1cb7245ee4579853e761f46cab48d8821c61ba0493efd551d624bedd5fbb4e445752699ba984a6fd861469248ae9477ab6a28cd561afe7000157cb5

Malware Config

Extracted

Family

cerberus

C2

http://20.90.106.208/

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Checks Android system properties for emulator presence. 1 IoCs
  • Loads dropped Dex/Jar 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses reflection 8 IoCs

Processes

  • com.casino.shed
    1⤵
    • Checks Android system properties for emulator presence.
    • Loads dropped Dex/Jar
    • Uses reflection
    PID:4781

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads