General

  • Target

    63e94222fde7ff90ddd81341c409f148_JaffaCakes118

  • Size

    3.1MB

  • Sample

    240401-bv2eyaab25

  • MD5

    63e94222fde7ff90ddd81341c409f148

  • SHA1

    4a911259cc5fb7b3312fb5c41435d05819cf4b81

  • SHA256

    fdd9db26f25d0d784b5692003f46320d8400266b6573d5c8ec6dd6c4e2e7bc72

  • SHA512

    aad056f2a5c4ef62e5810cc56d29e618de7f4d2c263307759306a2ff9060cb6959b94fa21cbc68fef13ef2f430fa4ef2df11e5e751cbc909a44bbdc5b86238f9

  • SSDEEP

    98304:qM9aGG8dgNlFdOY6H5uWctMbpys35JSckrE1Fc:RaDFNlTKpy+6rB

Malware Config

Extracted

Family

cerberus

C2

http://161.97.68.93

Targets

    • Target

      63e94222fde7ff90ddd81341c409f148_JaffaCakes118

    • Size

      3.1MB

    • MD5

      63e94222fde7ff90ddd81341c409f148

    • SHA1

      4a911259cc5fb7b3312fb5c41435d05819cf4b81

    • SHA256

      fdd9db26f25d0d784b5692003f46320d8400266b6573d5c8ec6dd6c4e2e7bc72

    • SHA512

      aad056f2a5c4ef62e5810cc56d29e618de7f4d2c263307759306a2ff9060cb6959b94fa21cbc68fef13ef2f430fa4ef2df11e5e751cbc909a44bbdc5b86238f9

    • SSDEEP

      98304:qM9aGG8dgNlFdOY6H5uWctMbpys35JSckrE1Fc:RaDFNlTKpy+6rB

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks