General

  • Target

    4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76

  • Size

    1.8MB

  • Sample

    220521-d92elahaf5

  • MD5

    28e33d3564f8e222d503a67bc89e6289

  • SHA1

    cbae48ff8f98ac6d43022648135b69a6c208ed2d

  • SHA256

    4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76

  • SHA512

    38dc9abdcd81f2e4c79e8443384bac1f2c01d1b3eee9a7a78cd280772dac1746da9b3f863a97f17f2a2a14d71b87a71c7f0f953c2998be8f7d5fe750fa551ece

Malware Config

Extracted

Family

cerberus

C2

http://hatefraud.com

Targets

    • Target

      4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76

    • Size

      1.8MB

    • MD5

      28e33d3564f8e222d503a67bc89e6289

    • SHA1

      cbae48ff8f98ac6d43022648135b69a6c208ed2d

    • SHA256

      4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76

    • SHA512

      38dc9abdcd81f2e4c79e8443384bac1f2c01d1b3eee9a7a78cd280772dac1746da9b3f863a97f17f2a2a14d71b87a71c7f0f953c2998be8f7d5fe750fa551ece

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks