General
-
Target
JaffaCakes118_74192de5d242c75c72c7bbb29ca21e1e998f6a7c6293f3dcd34a97a567a2a2b2
-
Size
2.8MB
-
Sample
241222-a2ts1awpcp
-
MD5
84033a0577a4e2340d67291741e38848
-
SHA1
38e10babcfa9fe6a892ab37caad2197239f70add
-
SHA256
74192de5d242c75c72c7bbb29ca21e1e998f6a7c6293f3dcd34a97a567a2a2b2
-
SHA512
ecd7e5640177d293bf0e4ad6ff71758b33b0f25cf22064d81aea274b5795c56adfad9c3bf094055870b9e4ee18e8d2634e6e1fa540ef3af71e950f840c517c87
-
SSDEEP
49152:J/jdUhSe+5xpffykelJ/s6OWvRb+F+UbZCtY7KeZaqkzDUOd+LrZ03Aq5GZfdky/:Jjd+SZLyNrBvRba+yCC7Aqkk+ROZfddb
Static task
static1
Behavioral task
behavioral1
Sample
e596834d65db453dd277ba35126f1c1703ba633100b226a18f1ada6b9c722f18.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e596834d65db453dd277ba35126f1c1703ba633100b226a18f1ada6b9c722f18.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e596834d65db453dd277ba35126f1c1703ba633100b226a18f1ada6b9c722f18.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
cerberus
http://spacecomdomainscomcocspaces.space/
Targets
-
-
Target
e596834d65db453dd277ba35126f1c1703ba633100b226a18f1ada6b9c722f18
-
Size
2.9MB
-
MD5
78e5c211f3aa83dde33736bfdb78de81
-
SHA1
16c5cf6d834b9a2a0c30f3f4b6ff32ee4f6e2e46
-
SHA256
e596834d65db453dd277ba35126f1c1703ba633100b226a18f1ada6b9c722f18
-
SHA512
d35dd556b380181680bc1247e5c7818aec8db13a038bad93922d50804b98462034aa4f195e5c531f0a13b16517942b8f6db54f8d04733f76b90eeaed3c46d52e
-
SSDEEP
49152:PNPzR7XNgs9uWCVW6G90H8aZwSFzeTOgdEg/ghZU0QfEecgHjAUXF+fdfhbp:xzR7XNguuRqO6OzeSgCgoI0Q8hSA8+rF
-
Cerberus family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
3Suppress Application Icon
1User Evasion
2Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1