General

  • Target

    199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d

  • Size

    1.5MB

  • Sample

    220521-pjznvsfdg4

  • MD5

    9f0a014aaf851875c4e77f5dd980c68c

  • SHA1

    7f2d4e6e9666d9d18c270c983b3b885e02715e52

  • SHA256

    199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d

  • SHA512

    e3225e0002a1cecb05bccc7788e950bd62d290ca73197366078442287461e65d81eee92ba891b1bf886af605c74125bbb0ce09d51830738cab02b19efa095829

Malware Config

Extracted

Family

cerberus

C2

http://android244.ru

Targets

    • Target

      199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d

    • Size

      1.5MB

    • MD5

      9f0a014aaf851875c4e77f5dd980c68c

    • SHA1

      7f2d4e6e9666d9d18c270c983b3b885e02715e52

    • SHA256

      199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d

    • SHA512

      e3225e0002a1cecb05bccc7788e950bd62d290ca73197366078442287461e65d81eee92ba891b1bf886af605c74125bbb0ce09d51830738cab02b19efa095829

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks