General

  • Target

    98760316871b069b1b0ec0db65be7e55

  • Size

    3.3MB

  • Sample

    240213-eybv8sah28

  • MD5

    98760316871b069b1b0ec0db65be7e55

  • SHA1

    0feaff406b7676631bb40807057fc3a17a0277d3

  • SHA256

    bdf74a6a3a6c7a0d7e4c62b19c52ceabb5432355a939b269a4e73d46783af681

  • SHA512

    6c32a0e07081a9bf4112758b1c4d42a8169a1449f7205b4a5eeb190f4821b322bf10231138931cd326da8572948da22a2354bf03a246266aac961b327c1862a5

  • SSDEEP

    49152:b22BHE8hPAc8tjI66lbAMiyql9lOHb5aG03C1mCehtTLT0g8UpimQIHNOssfymEH:i8Eu81INFiyq3lVP3C8nLT5A93nQ

Malware Config

Extracted

Family

cerberus

C2

https://ourcoming.com

Targets

    • Target

      98760316871b069b1b0ec0db65be7e55

    • Size

      3.3MB

    • MD5

      98760316871b069b1b0ec0db65be7e55

    • SHA1

      0feaff406b7676631bb40807057fc3a17a0277d3

    • SHA256

      bdf74a6a3a6c7a0d7e4c62b19c52ceabb5432355a939b269a4e73d46783af681

    • SHA512

      6c32a0e07081a9bf4112758b1c4d42a8169a1449f7205b4a5eeb190f4821b322bf10231138931cd326da8572948da22a2354bf03a246266aac961b327c1862a5

    • SSDEEP

      49152:b22BHE8hPAc8tjI66lbAMiyql9lOHb5aG03C1mCehtTLT0g8UpimQIHNOssfymEH:i8Eu81INFiyq3lVP3C8nLT5A93nQ

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks