General

  • Target

    36d74678883c57f5137c97724de7b5f9

  • Size

    133KB

  • Sample

    231231-p4ybjacgak

  • MD5

    36d74678883c57f5137c97724de7b5f9

  • SHA1

    25690ee82dfc655ba4a82398d3f659372944e2f6

  • SHA256

    ca02cef3c88aa071c809f43859a14e3e375d625014f94b927b0fde03230f2994

  • SHA512

    53a31671ff2066c7f0001be75e6f40e941b91886a2614a630cd58fefdf7d4e50b4b30caa2eed819b68ffd1212d28b59d689e1f6b3e62674e3b48ce0b27d248e4

  • SSDEEP

    3072:QOMy9IyJEOQ7N28svOG5Ij0ruLuIQ2XzXcvkS:CyK+ELsOGij0rovQ2jsv5

Malware Config

Extracted

Family

cerberus

C2

https://serpiligunlersizinle.xyz

Targets

    • Target

      36d74678883c57f5137c97724de7b5f9

    • Size

      133KB

    • MD5

      36d74678883c57f5137c97724de7b5f9

    • SHA1

      25690ee82dfc655ba4a82398d3f659372944e2f6

    • SHA256

      ca02cef3c88aa071c809f43859a14e3e375d625014f94b927b0fde03230f2994

    • SHA512

      53a31671ff2066c7f0001be75e6f40e941b91886a2614a630cd58fefdf7d4e50b4b30caa2eed819b68ffd1212d28b59d689e1f6b3e62674e3b48ce0b27d248e4

    • SSDEEP

      3072:QOMy9IyJEOQ7N28svOG5Ij0ruLuIQ2XzXcvkS:CyK+ELsOGij0rovQ2jsv5

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks