General

  • Target

    1d755806e0b3de29faf431c891921c2a

  • Size

    3.9MB

  • Sample

    231230-1l8v4aefbk

  • MD5

    1d755806e0b3de29faf431c891921c2a

  • SHA1

    73aeceebd43de7fb385deb42f1352bd7d35335ba

  • SHA256

    203ff08786e36953f9a8fcf27cc28edfc4cac0d6e02e5f43e6c236f37a428b33

  • SHA512

    de95e9c1c24ede26cb81a5f9adbb65717a0c1da5f63ddb39d6f9cf1fc97176af07966e745f4f66e599f4c781eb1eb74cb3f02b10a9385c510635448f5c984661

  • SSDEEP

    98304:OUaonkMLwTeks5cSA9YUa90w7CKbbC8JefCMyhJ5u3CD8:oonkML4eks5cSGG2INbCwT+H

Malware Config

Extracted

Family

cerberus

C2

http://systemsettings.cf

Targets

    • Target

      1d755806e0b3de29faf431c891921c2a

    • Size

      3.9MB

    • MD5

      1d755806e0b3de29faf431c891921c2a

    • SHA1

      73aeceebd43de7fb385deb42f1352bd7d35335ba

    • SHA256

      203ff08786e36953f9a8fcf27cc28edfc4cac0d6e02e5f43e6c236f37a428b33

    • SHA512

      de95e9c1c24ede26cb81a5f9adbb65717a0c1da5f63ddb39d6f9cf1fc97176af07966e745f4f66e599f4c781eb1eb74cb3f02b10a9385c510635448f5c984661

    • SSDEEP

      98304:OUaonkMLwTeks5cSA9YUa90w7CKbbC8JefCMyhJ5u3CD8:oonkML4eks5cSGG2INbCwT+H

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks