General
-
Target
8d12d204036baf36104520de8ccf47b1.jar
-
Size
1.1MB
-
Sample
210117-b6zy2kn2k6
-
MD5
8d12d204036baf36104520de8ccf47b1
-
SHA1
2f488db88d1d8b6b2f01f422b581b3c71a916590
-
SHA256
8b169fd5768e294ae267938aceb646911dbc3e89241d9977266cb444b7d51c5f
-
SHA512
c0d402d81574b9ae844496150115d4a1fc6ade41ec44fb93fd1ecc8a13a9b2f0636654dd4c14f337e014c74b4dc6f4cb86c9393bd02a49775a9e8a49ba58f075
Static task
static1
Behavioral task
behavioral1
Sample
8d12d204036baf36104520de8ccf47b1.jar.apk
Resource
android-x86_64_arm64
Malware Config
Extracted
cerberus
http://privateone.top
Targets
-
-
Target
8d12d204036baf36104520de8ccf47b1.jar
-
Size
1.1MB
-
MD5
8d12d204036baf36104520de8ccf47b1
-
SHA1
2f488db88d1d8b6b2f01f422b581b3c71a916590
-
SHA256
8b169fd5768e294ae267938aceb646911dbc3e89241d9977266cb444b7d51c5f
-
SHA512
c0d402d81574b9ae844496150115d4a1fc6ade41ec44fb93fd1ecc8a13a9b2f0636654dd4c14f337e014c74b4dc6f4cb86c9393bd02a49775a9e8a49ba58f075
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-