General

  • Target

    29005e3560f583a14d22f348dc7e3db1_JaffaCakes118

  • Size

    2.7MB

  • Sample

    240329-wmrwraed31

  • MD5

    29005e3560f583a14d22f348dc7e3db1

  • SHA1

    13aeaea9b7601539a170e38a56dd44173454c668

  • SHA256

    392f2c9d5656e68cf9155d07dc83f4fdf7533369545f44bf4c5db7cc4900c99d

  • SHA512

    96bc3aac5e3fa88d2dd59a3270cca8e279752cf8f755149d641480e4f671be4b0b3217448760ec957fda1cd117ab3266e27653b52a926f3c6bc0bd84afad19b9

  • SSDEEP

    49152:8GS4YhJIRbSWNQhxZDIUo9yYThVD6ST4I7NmfP3BDjyEmakQDPr4qA:8GTkItS8mZRo9vhVGSsI7Nm35GxakQDy

Malware Config

Extracted

Family

cerberus

C2

http://194.163.187.220

Targets

    • Target

      29005e3560f583a14d22f348dc7e3db1_JaffaCakes118

    • Size

      2.7MB

    • MD5

      29005e3560f583a14d22f348dc7e3db1

    • SHA1

      13aeaea9b7601539a170e38a56dd44173454c668

    • SHA256

      392f2c9d5656e68cf9155d07dc83f4fdf7533369545f44bf4c5db7cc4900c99d

    • SHA512

      96bc3aac5e3fa88d2dd59a3270cca8e279752cf8f755149d641480e4f671be4b0b3217448760ec957fda1cd117ab3266e27653b52a926f3c6bc0bd84afad19b9

    • SSDEEP

      49152:8GS4YhJIRbSWNQhxZDIUo9yYThVD6ST4I7NmfP3BDjyEmakQDPr4qA:8GTkItS8mZRo9vhVGSsI7Nm35GxakQDy

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks