Resubmissions

04-02-2024 00:21

240204-anmgrsfeaj 10

03-02-2024 03:46

240203-eby29aagbk 10

General

  • Target

    8b504dfabe407c31c122e2df5f589f42

  • Size

    3.2MB

  • Sample

    240204-anmgrsfeaj

  • MD5

    8b504dfabe407c31c122e2df5f589f42

  • SHA1

    d58e93417044d57a7851b733fb4fce36c12ec3d9

  • SHA256

    5375ed5bf5cc2df45e19fe0c3ef7b98473d1907f20b2bb1243eaf6d3eb2a1d66

  • SHA512

    8ed1ed4e22cd7d8364618a657f2739c2936716e6c10dd3a6181b19f1f506af2d379ea079183760ccdb4211452eba81716a079906d31517252624e22a292d8c63

  • SSDEEP

    98304:X+MlRhSI6vc9wJG7lcGDaWou1xLk6B96M3DsEd:X+gRhMz5tWou1xg6m0d

Malware Config

Extracted

Family

cerberus

C2

http://toanatroyxyz.xyz

Targets

    • Target

      8b504dfabe407c31c122e2df5f589f42

    • Size

      3.2MB

    • MD5

      8b504dfabe407c31c122e2df5f589f42

    • SHA1

      d58e93417044d57a7851b733fb4fce36c12ec3d9

    • SHA256

      5375ed5bf5cc2df45e19fe0c3ef7b98473d1907f20b2bb1243eaf6d3eb2a1d66

    • SHA512

      8ed1ed4e22cd7d8364618a657f2739c2936716e6c10dd3a6181b19f1f506af2d379ea079183760ccdb4211452eba81716a079906d31517252624e22a292d8c63

    • SSDEEP

      98304:X+MlRhSI6vc9wJG7lcGDaWou1xLk6B96M3DsEd:X+gRhMz5tWou1xg6m0d

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks