General

  • Target

    a910d26af2139ed9070774f36fa9bb06_JaffaCakes118

  • Size

    136KB

  • Sample

    241127-wwfj3s1jej

  • MD5

    a910d26af2139ed9070774f36fa9bb06

  • SHA1

    817d6a8a2e8f846c980963a5fb37c6e06c7b30e3

  • SHA256

    b40b9bf089b84e75979dc53905461793890f79bee528f123b594c22085e213b6

  • SHA512

    99bcf7f6770e8ccecefccb2a1bec76f4adc2c61478cdeb51d534f57e10576c769cda4c291f5b2d2d5744428df40d7a0dc29088801ecd4bfb190f56e5b0b148d3

  • SSDEEP

    3072:CiM5eROwXw442uc1oIfFSUSX4rqEq/JOmJOV8d8SwA4z4wA4z8UlvDm8eUlvDm8y:CX5eROsXw8fznrqEqQXCarA4z1A4zPvU

Malware Config

Extracted

Family

cerberus

C2

http://20.49.203.83/

Targets

    • Target

      a910d26af2139ed9070774f36fa9bb06_JaffaCakes118

    • Size

      136KB

    • MD5

      a910d26af2139ed9070774f36fa9bb06

    • SHA1

      817d6a8a2e8f846c980963a5fb37c6e06c7b30e3

    • SHA256

      b40b9bf089b84e75979dc53905461793890f79bee528f123b594c22085e213b6

    • SHA512

      99bcf7f6770e8ccecefccb2a1bec76f4adc2c61478cdeb51d534f57e10576c769cda4c291f5b2d2d5744428df40d7a0dc29088801ecd4bfb190f56e5b0b148d3

    • SSDEEP

      3072:CiM5eROwXw442uc1oIfFSUSX4rqEq/JOmJOV8d8SwA4z4wA4z8UlvDm8eUlvDm8y:CX5eROsXw8fznrqEqQXCarA4z1A4zPvU

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks