General

  • Target

    fc4f4dfb9f312af032672ae77bc769cb_JaffaCakes118

  • Size

    3.2MB

  • Sample

    240420-j2ll3acc28

  • MD5

    fc4f4dfb9f312af032672ae77bc769cb

  • SHA1

    5bd3060d874aef477e63e898285c32bd4a29b0e4

  • SHA256

    8045102c0180c6f41b28893a69939004924d8dd9fa4d54a804c69fc5788b3d9f

  • SHA512

    cd4e0ecffe434f1ce3e9316b3e093a6d830dbc5d0db2e445759d935714d6e25d3ac66e8c33ffec318202d4250b0e7c8ed69387ba0e31d221000111c64b24d918

  • SSDEEP

    49152:PiZZX+J5IR13eGL93TFr4cMXeOpPfr649MYHbbz5C7pcUO58QJ9v9qQtMOPN7+2j:TInPL9jFr4cwhT6gMyo7Q5TTMUNCPLpE

Malware Config

Extracted

Family

cerberus

C2

http://45.146.254.91

Targets

    • Target

      fc4f4dfb9f312af032672ae77bc769cb_JaffaCakes118

    • Size

      3.2MB

    • MD5

      fc4f4dfb9f312af032672ae77bc769cb

    • SHA1

      5bd3060d874aef477e63e898285c32bd4a29b0e4

    • SHA256

      8045102c0180c6f41b28893a69939004924d8dd9fa4d54a804c69fc5788b3d9f

    • SHA512

      cd4e0ecffe434f1ce3e9316b3e093a6d830dbc5d0db2e445759d935714d6e25d3ac66e8c33ffec318202d4250b0e7c8ed69387ba0e31d221000111c64b24d918

    • SSDEEP

      49152:PiZZX+J5IR13eGL93TFr4cMXeOpPfr649MYHbbz5C7pcUO58QJ9v9qQtMOPN7+2j:TInPL9jFr4cwhT6gMyo7Q5TTMUNCPLpE

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks