General
-
Target
38f2bddcbc5c64f413e2a8b4c06cd5a44a7c5256c40b841cb0627985fde5ba73.bin
-
Size
2.3MB
-
Sample
241113-13ctzs1alq
-
MD5
73783757dff0a93cd88b2b188eab81ed
-
SHA1
8882b08b449a61b7d2b9b3d39408176774fa9789
-
SHA256
38f2bddcbc5c64f413e2a8b4c06cd5a44a7c5256c40b841cb0627985fde5ba73
-
SHA512
872cb60c159f5d8e58afa07f49974146f7846d06a7d1153eb886ac4c62fbc1484628b01a0a3a639ffad8d651d9070f25a3ce3e3ba5a8f74067e32d7fa95f7132
-
SSDEEP
49152:5wJXUA7Cj/Ta3ahqSXVEtKdlfGHRVEoOEe8ZqSbcXtk3X0grbbTW8NvfLVbojBUi:y7c/2K9XVEtEGRaVEFqSg9Wk6/WyfLVM
Static task
static1
Behavioral task
behavioral1
Sample
38f2bddcbc5c64f413e2a8b4c06cd5a44a7c5256c40b841cb0627985fde5ba73.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
38f2bddcbc5c64f413e2a8b4c06cd5a44a7c5256c40b841cb0627985fde5ba73.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
38f2bddcbc5c64f413e2a8b4c06cd5a44a7c5256c40b841cb0627985fde5ba73.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
cerberus
http://5.199.161.14
Targets
-
-
Target
38f2bddcbc5c64f413e2a8b4c06cd5a44a7c5256c40b841cb0627985fde5ba73.bin
-
Size
2.3MB
-
MD5
73783757dff0a93cd88b2b188eab81ed
-
SHA1
8882b08b449a61b7d2b9b3d39408176774fa9789
-
SHA256
38f2bddcbc5c64f413e2a8b4c06cd5a44a7c5256c40b841cb0627985fde5ba73
-
SHA512
872cb60c159f5d8e58afa07f49974146f7846d06a7d1153eb886ac4c62fbc1484628b01a0a3a639ffad8d651d9070f25a3ce3e3ba5a8f74067e32d7fa95f7132
-
SSDEEP
49152:5wJXUA7Cj/Ta3ahqSXVEtKdlfGHRVEoOEe8ZqSbcXtk3X0grbbTW8NvfLVbojBUi:y7c/2K9XVEtEGRaVEFqSg9Wk6/WyfLVM
-
Cerberus family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1