General

  • Target

    af620a62ab5911587b55a402bda10e7b

  • Size

    3.1MB

  • Sample

    240229-y4qfcsbd3y

  • MD5

    af620a62ab5911587b55a402bda10e7b

  • SHA1

    48da6580f1aee833b8c76fbf19df1c9bda7fbbba

  • SHA256

    d8564f37d48a023ae2cbd2b7b27df61876a572b445db9c66ea904e95d2d64da1

  • SHA512

    c6d56c031358b7322f05e66e69f05aa91ea6e203a3fd5e61a66ab26ad843023263c0f82f335399b40d40b7066e78a192625766e059e21539843c121fa7014d39

  • SSDEEP

    49152:x2CEh6eaR+wZhFcZnZtC97wHM9fD6PmF/n/L7qP3mHwtVHu5qJTs1EIMxPFAa3s:zeGEnZte7he+hD7qeHYGqJuMtKa3s

Malware Config

Extracted

Family

cerberus

C2

http://kusurabakmahayat.xyz

Targets

    • Target

      af620a62ab5911587b55a402bda10e7b

    • Size

      3.1MB

    • MD5

      af620a62ab5911587b55a402bda10e7b

    • SHA1

      48da6580f1aee833b8c76fbf19df1c9bda7fbbba

    • SHA256

      d8564f37d48a023ae2cbd2b7b27df61876a572b445db9c66ea904e95d2d64da1

    • SHA512

      c6d56c031358b7322f05e66e69f05aa91ea6e203a3fd5e61a66ab26ad843023263c0f82f335399b40d40b7066e78a192625766e059e21539843c121fa7014d39

    • SSDEEP

      49152:x2CEh6eaR+wZhFcZnZtC97wHM9fD6PmF/n/L7qP3mHwtVHu5qJTs1EIMxPFAa3s:zeGEnZte7he+hD7qeHYGqJuMtKa3s

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks