General

  • Target

    9e99e0232567b19ec3e1cf763cdc5ef0

  • Size

    3.3MB

  • Sample

    240215-z7wxzshe54

  • MD5

    9e99e0232567b19ec3e1cf763cdc5ef0

  • SHA1

    0cea6346cfeaebeec3153102d96db22d97e18748

  • SHA256

    1ca86bc9060a5a18bc7125be12eeccf88f7a812480d351254b5e19e838536dbd

  • SHA512

    45cb8581413da20ce3379f334cb81883a059004d36dd4f3c3362380d403a0756124f0c79ca0ca3db763bac609ef5b158c1667ceb0f24eee7ce811300af875a5f

  • SSDEEP

    98304:4j6d0uRnz7Z7K/Ktmfl6onLEKjPqFRuUm:4jiNz7xK/KtmooL7qXm

Malware Config

Extracted

Family

cerberus

C2

http://merdaneferdane.xyz

Targets

    • Target

      9e99e0232567b19ec3e1cf763cdc5ef0

    • Size

      3.3MB

    • MD5

      9e99e0232567b19ec3e1cf763cdc5ef0

    • SHA1

      0cea6346cfeaebeec3153102d96db22d97e18748

    • SHA256

      1ca86bc9060a5a18bc7125be12eeccf88f7a812480d351254b5e19e838536dbd

    • SHA512

      45cb8581413da20ce3379f334cb81883a059004d36dd4f3c3362380d403a0756124f0c79ca0ca3db763bac609ef5b158c1667ceb0f24eee7ce811300af875a5f

    • SSDEEP

      98304:4j6d0uRnz7Z7K/Ktmfl6onLEKjPqFRuUm:4jiNz7xK/KtmooL7qXm

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks