General

  • Target

    80141238b73484038be9cf83e1919259

  • Size

    3.9MB

  • Sample

    231226-vw6wlaada2

  • MD5

    80141238b73484038be9cf83e1919259

  • SHA1

    608526a615977d8371b51d6702e882e752d898e7

  • SHA256

    4142993da33aab4ab5d4fe6893fdabd8dad03a336d433f1fdf30b9da57bbace9

  • SHA512

    dbc962d1a53530d6c1a279fed541c85b783b6eac663e587e2d4373d493ce625281e91357321fc7bebe5b9e5d5feda89a30d8591d300390651e3e7161da728386

  • SSDEEP

    98304:cbH2tYwDP9RiuwQvKxlPIBggggggg5ej7BTWTvwGl:m2tYY1RH7IlPIBggggggg5ehWT4Gl

Malware Config

Extracted

Family

cerberus

C2

http://199.188.203.218

Targets

    • Target

      80141238b73484038be9cf83e1919259

    • Size

      3.9MB

    • MD5

      80141238b73484038be9cf83e1919259

    • SHA1

      608526a615977d8371b51d6702e882e752d898e7

    • SHA256

      4142993da33aab4ab5d4fe6893fdabd8dad03a336d433f1fdf30b9da57bbace9

    • SHA512

      dbc962d1a53530d6c1a279fed541c85b783b6eac663e587e2d4373d493ce625281e91357321fc7bebe5b9e5d5feda89a30d8591d300390651e3e7161da728386

    • SSDEEP

      98304:cbH2tYwDP9RiuwQvKxlPIBggggggg5ej7BTWTvwGl:m2tYY1RH7IlPIBggggggg5ehWT4Gl

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks