General
-
Target
ec4d56312a968b0077f1110a549ea0e793eb1ad2d33bfb8da7724adfed9e6492
-
Size
3.4MB
-
Sample
210415-mq3h5a65bj
-
MD5
2d35c890c67e816af1a06309b434591b
-
SHA1
5b15735f0118c6b15fb9acf80c27f195f4da8139
-
SHA256
ec4d56312a968b0077f1110a549ea0e793eb1ad2d33bfb8da7724adfed9e6492
-
SHA512
c0e1594912e5ca72375e79decfe7d11df4d535de314d760736884102449aa9b7a371249642ae8314d8989023dc56b40dddfc030f684ff052d111906fe401e995
Static task
static1
Behavioral task
behavioral1
Sample
ec4d56312a968b0077f1110a549ea0e793eb1ad2d33bfb8da7724adfed9e6492.apk
Resource
android-x86_64
Malware Config
Extracted
cerberus
http://141.105.65.90/
Targets
-
-
Target
ec4d56312a968b0077f1110a549ea0e793eb1ad2d33bfb8da7724adfed9e6492
-
Size
3.4MB
-
MD5
2d35c890c67e816af1a06309b434591b
-
SHA1
5b15735f0118c6b15fb9acf80c27f195f4da8139
-
SHA256
ec4d56312a968b0077f1110a549ea0e793eb1ad2d33bfb8da7724adfed9e6492
-
SHA512
c0e1594912e5ca72375e79decfe7d11df4d535de314d760736884102449aa9b7a371249642ae8314d8989023dc56b40dddfc030f684ff052d111906fe401e995
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Tries to add a device administrator.
-