General

  • Target

    b69f4a2b8cff204d9c42dc4d7277fa96

  • Size

    133KB

  • Sample

    240306-f7w37sca3v

  • MD5

    b69f4a2b8cff204d9c42dc4d7277fa96

  • SHA1

    6e1fa50f394ec8cdba5fddfc5d73f46c61bd5c3a

  • SHA256

    935ed96da7b95fd6740f9e2950e32f6a25112597bd5a00f705c351db7761c1ef

  • SHA512

    cf51e2016ad1617edc5f3375a50a5d3a1ae375d8c641345c9a2216ebe7c8e44e5da35839a21185e424c4770550f4968836819ff7ad5f80a1ff038d399d97b368

  • SSDEEP

    1536:AL3E50uXsIGFQgUmsLXQLTzlUs5u++BD6BcSWeUAGZ0GuLuIyPy5fXrfXZqL1wqo:MvFQgcgLno8+SWee0GuLuIQ2XzXcvE

Malware Config

Extracted

Family

cerberus

C2

https://kesinliklenetolmak.xyz

Targets

    • Target

      b69f4a2b8cff204d9c42dc4d7277fa96

    • Size

      133KB

    • MD5

      b69f4a2b8cff204d9c42dc4d7277fa96

    • SHA1

      6e1fa50f394ec8cdba5fddfc5d73f46c61bd5c3a

    • SHA256

      935ed96da7b95fd6740f9e2950e32f6a25112597bd5a00f705c351db7761c1ef

    • SHA512

      cf51e2016ad1617edc5f3375a50a5d3a1ae375d8c641345c9a2216ebe7c8e44e5da35839a21185e424c4770550f4968836819ff7ad5f80a1ff038d399d97b368

    • SSDEEP

      1536:AL3E50uXsIGFQgUmsLXQLTzlUs5u++BD6BcSWeUAGZ0GuLuIyPy5fXrfXZqL1wqo:MvFQgcgLno8+SWee0GuLuIQ2XzXcvE

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks