General

  • Target

    5f52cac5223bb5287577d2ae8b6ea844

  • Size

    3.2MB

  • Sample

    240116-jensxagec6

  • MD5

    5f52cac5223bb5287577d2ae8b6ea844

  • SHA1

    39a4ddd826d6af00e6566c9e258440dfff10ccb3

  • SHA256

    ecc5143e8d99690b6a7e44ab0c936e29a7374416c1f46d211e587264e99aa3b4

  • SHA512

    44a3f5f159bce55c33d3f4ac1a4d52791a22e3190666abd7cd2ef218c10142cf273ccdb6998d236e4bfc1063768098436529707f8c3fedfa695d669188f503f7

  • SSDEEP

    49152:Jrzz6GcZFzyRSGz4H6JiMyGwRkGNH1kj0AXQcsrDw46ivkPLuMVXnQXJaMo:cZF2RzHYzk0u4QQcMDw46Skj55IJaMo

Malware Config

Extracted

Family

cerberus

C2

http://samadeveloper.com/

Targets

    • Target

      5f52cac5223bb5287577d2ae8b6ea844

    • Size

      3.2MB

    • MD5

      5f52cac5223bb5287577d2ae8b6ea844

    • SHA1

      39a4ddd826d6af00e6566c9e258440dfff10ccb3

    • SHA256

      ecc5143e8d99690b6a7e44ab0c936e29a7374416c1f46d211e587264e99aa3b4

    • SHA512

      44a3f5f159bce55c33d3f4ac1a4d52791a22e3190666abd7cd2ef218c10142cf273ccdb6998d236e4bfc1063768098436529707f8c3fedfa695d669188f503f7

    • SSDEEP

      49152:Jrzz6GcZFzyRSGz4H6JiMyGwRkGNH1kj0AXQcsrDw46ivkPLuMVXnQXJaMo:cZF2RzHYzk0u4QQcMDw46Skj55IJaMo

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks