General

  • Target

    535a44bdf1e75396280e013613075e38df5c4a37f24bbf6673ffb83b0a8c3aa0.bin

  • Size

    2.1MB

  • Sample

    250111-13ryxasjc1

  • MD5

    61a271879303fa0b27af3bc6aef5634d

  • SHA1

    d5ea416d9e80bd7ed38f793ac6974b370d0e9403

  • SHA256

    535a44bdf1e75396280e013613075e38df5c4a37f24bbf6673ffb83b0a8c3aa0

  • SHA512

    a7a280583464df6bf0afda397e10447630ea150269ebe246e5d36ae0b447ae645f12fb945062411f828a876e3533562de817e92a1bb789a9784f1f64f8816ab7

  • SSDEEP

    49152:YnTZYhwiQt5cQDwnaapPjEjQ/ZaHVXx3N2ewbJS/nRjZTHy4XDLCuJjcY3zW9:g9YhwiGxUnaapPjEjQ/wHVXx3N2ewbAC

Malware Config

Extracted

Family

cerberus

C2

http://135.181.192.116/

Targets

    • Target

      535a44bdf1e75396280e013613075e38df5c4a37f24bbf6673ffb83b0a8c3aa0.bin

    • Size

      2.1MB

    • MD5

      61a271879303fa0b27af3bc6aef5634d

    • SHA1

      d5ea416d9e80bd7ed38f793ac6974b370d0e9403

    • SHA256

      535a44bdf1e75396280e013613075e38df5c4a37f24bbf6673ffb83b0a8c3aa0

    • SHA512

      a7a280583464df6bf0afda397e10447630ea150269ebe246e5d36ae0b447ae645f12fb945062411f828a876e3533562de817e92a1bb789a9784f1f64f8816ab7

    • SSDEEP

      49152:YnTZYhwiQt5cQDwnaapPjEjQ/ZaHVXx3N2ewbJS/nRjZTHy4XDLCuJjcY3zW9:g9YhwiGxUnaapPjEjQ/wHVXx3N2ewbAC

    • Cerberus

      An Android banker that is being rented to actors beginning in 2019.

    • Cerberus family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks