General

  • Target

    JaffaCakes118_74192de5d242c75c72c7bbb29ca21e1e998f6a7c6293f3dcd34a97a567a2a2b2

  • Size

    2.8MB

  • Sample

    241222-a2ts1awpcp

  • MD5

    84033a0577a4e2340d67291741e38848

  • SHA1

    38e10babcfa9fe6a892ab37caad2197239f70add

  • SHA256

    74192de5d242c75c72c7bbb29ca21e1e998f6a7c6293f3dcd34a97a567a2a2b2

  • SHA512

    ecd7e5640177d293bf0e4ad6ff71758b33b0f25cf22064d81aea274b5795c56adfad9c3bf094055870b9e4ee18e8d2634e6e1fa540ef3af71e950f840c517c87

  • SSDEEP

    49152:J/jdUhSe+5xpffykelJ/s6OWvRb+F+UbZCtY7KeZaqkzDUOd+LrZ03Aq5GZfdky/:Jjd+SZLyNrBvRba+yCC7Aqkk+ROZfddb

Malware Config

Extracted

Family

cerberus

C2

http://spacecomdomainscomcocspaces.space/

Targets

    • Target

      e596834d65db453dd277ba35126f1c1703ba633100b226a18f1ada6b9c722f18

    • Size

      2.9MB

    • MD5

      78e5c211f3aa83dde33736bfdb78de81

    • SHA1

      16c5cf6d834b9a2a0c30f3f4b6ff32ee4f6e2e46

    • SHA256

      e596834d65db453dd277ba35126f1c1703ba633100b226a18f1ada6b9c722f18

    • SHA512

      d35dd556b380181680bc1247e5c7818aec8db13a038bad93922d50804b98462034aa4f195e5c531f0a13b16517942b8f6db54f8d04733f76b90eeaed3c46d52e

    • SSDEEP

      49152:PNPzR7XNgs9uWCVW6G90H8aZwSFzeTOgdEg/ghZU0QfEecgHjAUXF+fdfhbp:xzR7XNguuRqO6OzeSgCgoI0Q8hSA8+rF

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks