General

  • Target

    cb3b8bb92c43db38136fc856928e982a_JaffaCakes118

  • Size

    133KB

  • Sample

    241206-fxyt2sxqcp

  • MD5

    cb3b8bb92c43db38136fc856928e982a

  • SHA1

    0561150a99f522c2254717197bb15d56ccd46496

  • SHA256

    eca82507af36f745dfa5b2f70c1ba8c41a39a4fa7fa8bb83dd4dfb7ed989af08

  • SHA512

    d6558eadabb0de71ecd2190deb54e89d8179e16548b0287a171cebaf20b17d3a9e0f18d1cc1baeb31adf729af9fa82ec72d726439bd5780d2a5654b7a0e16127

  • SSDEEP

    3072:EIwAo4L9WYbyOHChIrxwKyL4bm2o0puLuIQ2XzXcvr:73TTiqrxwZL4bmB0povQ2jsvr

Malware Config

Extracted

Family

cerberus

C2

https://herzamankigibigeneburdayiz.xyz

Targets

    • Target

      cb3b8bb92c43db38136fc856928e982a_JaffaCakes118

    • Size

      133KB

    • MD5

      cb3b8bb92c43db38136fc856928e982a

    • SHA1

      0561150a99f522c2254717197bb15d56ccd46496

    • SHA256

      eca82507af36f745dfa5b2f70c1ba8c41a39a4fa7fa8bb83dd4dfb7ed989af08

    • SHA512

      d6558eadabb0de71ecd2190deb54e89d8179e16548b0287a171cebaf20b17d3a9e0f18d1cc1baeb31adf729af9fa82ec72d726439bd5780d2a5654b7a0e16127

    • SSDEEP

      3072:EIwAo4L9WYbyOHChIrxwKyL4bm2o0puLuIQ2XzXcvr:73TTiqrxwZL4bmB0povQ2jsvr

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks