General

  • Target

    dab1b4ad7ca4da0abe15530b0e23e879

  • Size

    101KB

  • Sample

    240321-e343ksbg77

  • MD5

    dab1b4ad7ca4da0abe15530b0e23e879

  • SHA1

    c2a688fc8db609bfa67d8b5162b434244275abdc

  • SHA256

    7bde38712efb19c0aa80a13e7b4a9266325848ce41a9dead6bb6303c0fda8281

  • SHA512

    8d99b9090c7aaad1363ddbc658685a1de4d72db1abf9fc20e021e4bab093f6f9b7427f57555ff8a92fb4a1bdffc6471c56ce225fae492e9cd898ef5984622b45

  • SSDEEP

    1536:8+bgK8tagu4T0Bc/1fFLvJSXdB26buOZVGViM6ndvFvE0BQ4x8h8o1QZ8JZ8Hp:8+cKC6c/19lS5CotFvr8h8o1QZ8JZ8Hp

Malware Config

Extracted

Family

cerberus

C2

http://192.3.15.118

Targets

    • Target

      dab1b4ad7ca4da0abe15530b0e23e879

    • Size

      101KB

    • MD5

      dab1b4ad7ca4da0abe15530b0e23e879

    • SHA1

      c2a688fc8db609bfa67d8b5162b434244275abdc

    • SHA256

      7bde38712efb19c0aa80a13e7b4a9266325848ce41a9dead6bb6303c0fda8281

    • SHA512

      8d99b9090c7aaad1363ddbc658685a1de4d72db1abf9fc20e021e4bab093f6f9b7427f57555ff8a92fb4a1bdffc6471c56ce225fae492e9cd898ef5984622b45

    • SSDEEP

      1536:8+bgK8tagu4T0Bc/1fFLvJSXdB26buOZVGViM6ndvFvE0BQ4x8h8o1QZ8JZ8Hp:8+cKC6c/19lS5CotFvr8h8o1QZ8JZ8Hp

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks