General

  • Target

    ee2370e2a1a7f85a99ece79d33a51b6b_JaffaCakes118

  • Size

    133KB

  • Sample

    241214-llv7nsxqax

  • MD5

    ee2370e2a1a7f85a99ece79d33a51b6b

  • SHA1

    cfd04ada3f64ae25667fe63dac1a7908070559ec

  • SHA256

    075352f0f8ac06163f06380fba36d778046e5c9ce3ffa15ef082f2ea1fec09eb

  • SHA512

    f0a73e930f289f65f811dc71fe2e0d8478f2a59f0666878dc6a85053d49e2271aeff874add80f1b348e4ac4043ed608bb66bd7966ba962cdc91bdee6f28d6453

  • SSDEEP

    3072:Cdk1gubPqNARcwz7qCeCM0cuLuIQ2XzXcvIQ:PREARo0covQ2jsvIQ

Malware Config

Extracted

Family

cerberus

C2

https://bensiznekadarmutluolabilirsinki.club

Targets

    • Target

      ee2370e2a1a7f85a99ece79d33a51b6b_JaffaCakes118

    • Size

      133KB

    • MD5

      ee2370e2a1a7f85a99ece79d33a51b6b

    • SHA1

      cfd04ada3f64ae25667fe63dac1a7908070559ec

    • SHA256

      075352f0f8ac06163f06380fba36d778046e5c9ce3ffa15ef082f2ea1fec09eb

    • SHA512

      f0a73e930f289f65f811dc71fe2e0d8478f2a59f0666878dc6a85053d49e2271aeff874add80f1b348e4ac4043ed608bb66bd7966ba962cdc91bdee6f28d6453

    • SSDEEP

      3072:Cdk1gubPqNARcwz7qCeCM0cuLuIQ2XzXcvIQ:PREARo0covQ2jsvIQ

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks