General

  • Target

    9889fdbc44a4698db09ee642887503a71811e70b0f176c2ca3e34c8ba5d6c706.bin

  • Size

    1.7MB

  • Sample

    241222-1192pszrgw

  • MD5

    d1f454002c08d28ad6369401750cff7d

  • SHA1

    59900a8927e7cc1815a7a31256bdf9e8c45c2c9d

  • SHA256

    9889fdbc44a4698db09ee642887503a71811e70b0f176c2ca3e34c8ba5d6c706

  • SHA512

    49c81fa09067fccb86055ee43a4497b397a47087460edbb03c4dd1a5cffa2da8069b45386d8e82ef35dd173cdf1927973fc8c5b27fc56f19d8685397067dca87

  • SSDEEP

    24576:EkjYxQVw4KOFV5V583zgsPTHIA3xFzYSkYUVzyDYci4kVjcLbl5fM3Mi872ao5at:E5xCFrSXPDxFhAlIkVju2cp2ao5ObLHF

Malware Config

Extracted

Family

cerberus

C2

http://188.120.236.119/

Targets

    • Target

      9889fdbc44a4698db09ee642887503a71811e70b0f176c2ca3e34c8ba5d6c706.bin

    • Size

      1.7MB

    • MD5

      d1f454002c08d28ad6369401750cff7d

    • SHA1

      59900a8927e7cc1815a7a31256bdf9e8c45c2c9d

    • SHA256

      9889fdbc44a4698db09ee642887503a71811e70b0f176c2ca3e34c8ba5d6c706

    • SHA512

      49c81fa09067fccb86055ee43a4497b397a47087460edbb03c4dd1a5cffa2da8069b45386d8e82ef35dd173cdf1927973fc8c5b27fc56f19d8685397067dca87

    • SSDEEP

      24576:EkjYxQVw4KOFV5V583zgsPTHIA3xFzYSkYUVzyDYci4kVjcLbl5fM3Mi872ao5at:E5xCFrSXPDxFhAlIkVju2cp2ao5ObLHF

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks