General

  • Target

    5726e0488c2e43f9776104aec2cd8088d748755a94fca57f2f6d5705afdf6357.apk

  • Size

    178KB

  • Sample

    211108-tnrw2acfd4

  • MD5

    956fc88cfa48c7a2512be68c70c9822e

  • SHA1

    7827228f6a3a4c703d4074c684858b5d395cc2dd

  • SHA256

    5726e0488c2e43f9776104aec2cd8088d748755a94fca57f2f6d5705afdf6357

  • SHA512

    2851ff019a8af1938a82003fbb7c52f86bcb5e3a8bf922e19150f9cfb0ebdd99bbae9571dff39c94ade8148b61f33af782c742d86e38bc9f75d09d654a932940

Malware Config

Extracted

Family

cerberus

C2

https://herhavuzundibiayni.com

Targets

    • Target

      5726e0488c2e43f9776104aec2cd8088d748755a94fca57f2f6d5705afdf6357.apk

    • Size

      178KB

    • MD5

      956fc88cfa48c7a2512be68c70c9822e

    • SHA1

      7827228f6a3a4c703d4074c684858b5d395cc2dd

    • SHA256

      5726e0488c2e43f9776104aec2cd8088d748755a94fca57f2f6d5705afdf6357

    • SHA512

      2851ff019a8af1938a82003fbb7c52f86bcb5e3a8bf922e19150f9cfb0ebdd99bbae9571dff39c94ade8148b61f33af782c742d86e38bc9f75d09d654a932940

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks