Analysis

  • max time kernel
    2734818s
  • max time network
    147s
  • platform
    android_x64
  • resource
    android-x64-arm64
  • submitted
    21-10-2021 13:16

General

  • Target

    13436a08047a69ec2e258eb718512d74f101e01638b17ab6fc7b53a92f0047e8.apk

  • Size

    149KB

  • MD5

    311a7c63e1bc046c93389619e4d575fd

  • SHA1

    01b97d16bf0a1d22ef906b364ce374dd474d6d18

  • SHA256

    13436a08047a69ec2e258eb718512d74f101e01638b17ab6fc7b53a92f0047e8

  • SHA512

    6b9a95b7028606b82546ac2dc8587b046db250973a115f805281948769ace181e88b11feddec7b85d4d2cc476b4fbc8efdac5726c3e7c7ee2378db12b6f17c84

Malware Config

Extracted

Family

cerberus

C2

https://genclikbayramlari.com

Signatures

  • Cerberus

    An Android banker that is being rented to actors beginning in 2019.

  • Checks Android system properties for emulator presence. 1 IoCs

Processes

  • com.mtcifx.epxpzddgchs
    1⤵
    • Checks Android system properties for emulator presence.
    PID:4000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads