General

  • Target

    91964426f769c467e1d5a58875cb4ba9_JaffaCakes118

  • Size

    119KB

  • Sample

    241124-azlplsvmfx

  • MD5

    91964426f769c467e1d5a58875cb4ba9

  • SHA1

    6a22b54c090847c0ba5713cf0b1d6e4b79f8d77d

  • SHA256

    a2f87e81afb6b58993df52a68c73f13121c093e11c5be97d4c404080bf5a4def

  • SHA512

    aaba70befd7e8be50c8cbaeaa3f1d61284fd37c08689eeb0ce100eb45cb6d69ae72e9a1934a94cc9209a46995ea95737a3a2aba951a2f5375c0ced41b057f40c

  • SSDEEP

    3072:Vjn16Q9qqLN4g0cH6n9xxAhsghsH010D0s:x1h9qs4txn9xxArq010D0s

Malware Config

Extracted

Family

cerberus

C2

https://nerdenbuldunsengenebeni.com

Targets

    • Target

      91964426f769c467e1d5a58875cb4ba9_JaffaCakes118

    • Size

      119KB

    • MD5

      91964426f769c467e1d5a58875cb4ba9

    • SHA1

      6a22b54c090847c0ba5713cf0b1d6e4b79f8d77d

    • SHA256

      a2f87e81afb6b58993df52a68c73f13121c093e11c5be97d4c404080bf5a4def

    • SHA512

      aaba70befd7e8be50c8cbaeaa3f1d61284fd37c08689eeb0ce100eb45cb6d69ae72e9a1934a94cc9209a46995ea95737a3a2aba951a2f5375c0ced41b057f40c

    • SSDEEP

      3072:Vjn16Q9qqLN4g0cH6n9xxAhsghsH010D0s:x1h9qs4txn9xxArq010D0s

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks