General

  • Target

    0332c8faf63fb20437757389d55fd8ad

  • Size

    149KB

  • Sample

    231229-zarl1agba9

  • MD5

    0332c8faf63fb20437757389d55fd8ad

  • SHA1

    22b31dfea58f28878ca6b6e48606669305e8702a

  • SHA256

    4c1589c0b47661eae7ca1b3b5993690917c8688dd9542b7c1d8bd3b7c0c4c77c

  • SHA512

    11e2cc77a3ee219e9511df6bd2b78fcb34aa83ec74986e3c08a8bc5c579e2d10f64795026d046a0a2541c134fc66c5b32563280b46e349247ee683bad9614f88

  • SSDEEP

    3072:pof0SaOtUlvxojNca10uxKPnVBIVBQhPZhPoF3:mMSS4Nco0uxi/I/SHQF3

Malware Config

Extracted

Family

cerberus

C2

https://genclikbayramlari.com

Targets

    • Target

      0332c8faf63fb20437757389d55fd8ad

    • Size

      149KB

    • MD5

      0332c8faf63fb20437757389d55fd8ad

    • SHA1

      22b31dfea58f28878ca6b6e48606669305e8702a

    • SHA256

      4c1589c0b47661eae7ca1b3b5993690917c8688dd9542b7c1d8bd3b7c0c4c77c

    • SHA512

      11e2cc77a3ee219e9511df6bd2b78fcb34aa83ec74986e3c08a8bc5c579e2d10f64795026d046a0a2541c134fc66c5b32563280b46e349247ee683bad9614f88

    • SSDEEP

      3072:pof0SaOtUlvxojNca10uxKPnVBIVBQhPZhPoF3:mMSS4Nco0uxi/I/SHQF3

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks