Analysis

  • max time kernel
    2541012s
  • platform
    android_x86
  • resource
    android-x86-arm
  • submitted
    19-10-2021 07:27

General

  • Target

    14e348c5c81b59f8a56bb09bdf5768d28fbe87339a7c543d6707249ebee4f6d0.apk

  • Size

    240KB

  • MD5

    e18dd20ad2db25cb9f63afd4d471b20f

  • SHA1

    631a22ae8bf03d83c1b2b5aceee18660a70d7a41

  • SHA256

    14e348c5c81b59f8a56bb09bdf5768d28fbe87339a7c543d6707249ebee4f6d0

  • SHA512

    164389107bec4231133fd6787a579eac2bbe80e82dbded4b09a4cd684580217072bb2b32339e152c0b0afab7d929c01d65c56414449e8fdae3f36256c607b60f

Malware Config

Extracted

Family

cerberus

C2

https://kaleninorasidere.com

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Makes use of the framework's Accessibility service. 1 IoCs
  • Listens for changes in the sensor environment (might be used to detect emulation). 1 IoCs

Processes

  • com.kmzdamgqlupjwuqe.vcolfrgnzdgwazo
    1⤵
    • Makes use of the framework's Accessibility service.
    • Listens for changes in the sensor environment (might be used to detect emulation).
    PID:4849

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads