General

  • Target

    cd9cc2c288b39d58324c96eedda21831

  • Size

    3.1MB

  • Sample

    240316-knfpbsfe6t

  • MD5

    cd9cc2c288b39d58324c96eedda21831

  • SHA1

    8b8b98c2245e32d29b0f2774693ea5b92c556fec

  • SHA256

    808f0c09e176834a8f3c0750677fbe9f6ec10caab55067cbec5c98dee300e151

  • SHA512

    2e78e9d72e98a5c73026fceca6117e681e92e4fe5752c0eef3aff0d364d907e4d1d447c18744b478aa7dcba687420082038ca6a6c8c31f1f38d0f5a82c0cdf8e

  • SSDEEP

    98304:ujfprLUanrvhUaeohPgThMtdugD2n/gBvPYb:+rnrZeohIThMt0gDIgB0

Malware Config

Extracted

Family

cerberus

C2

http://googleglobal.cf

Targets

    • Target

      cd9cc2c288b39d58324c96eedda21831

    • Size

      3.1MB

    • MD5

      cd9cc2c288b39d58324c96eedda21831

    • SHA1

      8b8b98c2245e32d29b0f2774693ea5b92c556fec

    • SHA256

      808f0c09e176834a8f3c0750677fbe9f6ec10caab55067cbec5c98dee300e151

    • SHA512

      2e78e9d72e98a5c73026fceca6117e681e92e4fe5752c0eef3aff0d364d907e4d1d447c18744b478aa7dcba687420082038ca6a6c8c31f1f38d0f5a82c0cdf8e

    • SSDEEP

      98304:ujfprLUanrvhUaeohPgThMtdugD2n/gBvPYb:+rnrZeohIThMt0gDIgB0

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks