General
-
Target
1e3e2c37c819e4d6fc7c2bb0cb2b9a302d94682cf960bd002553a10db2db0693.bin
-
Size
1.6MB
-
Sample
240708-1zwgxstdqh
-
MD5
12614456c8b9bbb2a35d276d84fc6df5
-
SHA1
80fd6cd176bac6b6f3449fc1350a9d979d29e864
-
SHA256
1e3e2c37c819e4d6fc7c2bb0cb2b9a302d94682cf960bd002553a10db2db0693
-
SHA512
15cbd4239f2526c3a956ce3269e08c14ced3eeeeaab0c410e3c74da7c9f098b67182a3fa9bd9e15bf531fc2746fa94a1a92f39593f5720ad0522fb056577c299
-
SSDEEP
49152:y+6VmPdqCnrhfVxTICBazsFm66b/mOyUlo:ykP0AF/nOSZ67mOyUlo
Behavioral task
behavioral1
Sample
1e3e2c37c819e4d6fc7c2bb0cb2b9a302d94682cf960bd002553a10db2db0693.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1e3e2c37c819e4d6fc7c2bb0cb2b9a302d94682cf960bd002553a10db2db0693.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
1e3e2c37c819e4d6fc7c2bb0cb2b9a302d94682cf960bd002553a10db2db0693.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
cerberus
-
uri
/villaburada.php?action=botcheck&data=
/villaburada.php?action=checkAP&data=
/villaburada.php?action=getModule&data=
/villaburada.php?action=getinj&data=
/villaburada.php?action=injcheck&data=
/villaburada.php?action=registration&data=
/villaburada.php?action=sendInjectLogs&data=
/villaburada.php?action=sendKeylogger&data=
/villaburada.php?action=sendSmsLogs&data=
/villaburada.php?action=timeInject&data=
Extracted
cerberus
.urlConnectPanel.
Targets
-
-
Target
1e3e2c37c819e4d6fc7c2bb0cb2b9a302d94682cf960bd002553a10db2db0693.bin
-
Size
1.6MB
-
MD5
12614456c8b9bbb2a35d276d84fc6df5
-
SHA1
80fd6cd176bac6b6f3449fc1350a9d979d29e864
-
SHA256
1e3e2c37c819e4d6fc7c2bb0cb2b9a302d94682cf960bd002553a10db2db0693
-
SHA512
15cbd4239f2526c3a956ce3269e08c14ced3eeeeaab0c410e3c74da7c9f098b67182a3fa9bd9e15bf531fc2746fa94a1a92f39593f5720ad0522fb056577c299
-
SSDEEP
49152:y+6VmPdqCnrhfVxTICBazsFm66b/mOyUlo:ykP0AF/nOSZ67mOyUlo
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Tries to add a device administrator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1Defense Evasion
Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1