General

  • Target

    700beb9999c245e961b8ad7483f3df2d

  • Size

    3.3MB

  • Sample

    240123-t5ye5sdcb5

  • MD5

    700beb9999c245e961b8ad7483f3df2d

  • SHA1

    e384e6b27ad71e764ecbe8afcb553d095c8a405d

  • SHA256

    2aec28011d9c414b88ae862806b9262655bd88088ea9113379b672e7d0eb80df

  • SHA512

    8a0eec5c11ab0c369d0fc43ea508f09d9c77f2c72e7bb6027a1a33c0ec390bd36e19701aff6479a99327ae2a88fbf13d0fd9454ed250180c0845a5145811eaf7

  • SSDEEP

    98304:/W1wBRH98slSUu5FmhCpYVabbXoEVDXotD77:/bBRH98SSUuXmmYVgoEVDotD77

Malware Config

Extracted

Family

cerberus

C2

http://52.183.39.178/

Targets

    • Target

      700beb9999c245e961b8ad7483f3df2d

    • Size

      3.3MB

    • MD5

      700beb9999c245e961b8ad7483f3df2d

    • SHA1

      e384e6b27ad71e764ecbe8afcb553d095c8a405d

    • SHA256

      2aec28011d9c414b88ae862806b9262655bd88088ea9113379b672e7d0eb80df

    • SHA512

      8a0eec5c11ab0c369d0fc43ea508f09d9c77f2c72e7bb6027a1a33c0ec390bd36e19701aff6479a99327ae2a88fbf13d0fd9454ed250180c0845a5145811eaf7

    • SSDEEP

      98304:/W1wBRH98slSUu5FmhCpYVabbXoEVDXotD77:/bBRH98SSUuXmmYVgoEVDotD77

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks