General
-
Target
113a264aa23669fffa61b23947f3341fbf6288954a4aed0f5face2e8d4df8bd9
-
Size
3.2MB
-
Sample
210415-sx5h7zmpe6
-
MD5
c4cb0bc55e2c5d8effd47b64ccb05bfd
-
SHA1
d46a68e7e63d6227e9378bdba4898d827ebef496
-
SHA256
113a264aa23669fffa61b23947f3341fbf6288954a4aed0f5face2e8d4df8bd9
-
SHA512
6fd331f696e451a346a15b4c8c0ceaf8e1957a0d649fc7bf44305012d15a50a4876ab92a92f3f0647ddef85f6287cc98e0dd9966b7da3ad0a8ee6e2db5103143
Static task
static1
Behavioral task
behavioral1
Sample
113a264aa23669fffa61b23947f3341fbf6288954a4aed0f5face2e8d4df8bd9.apk
Resource
android-x86_arm
Malware Config
Extracted
cerberus
http://185.206.147.229
Targets
-
-
Target
113a264aa23669fffa61b23947f3341fbf6288954a4aed0f5face2e8d4df8bd9
-
Size
3.2MB
-
MD5
c4cb0bc55e2c5d8effd47b64ccb05bfd
-
SHA1
d46a68e7e63d6227e9378bdba4898d827ebef496
-
SHA256
113a264aa23669fffa61b23947f3341fbf6288954a4aed0f5face2e8d4df8bd9
-
SHA512
6fd331f696e451a346a15b4c8c0ceaf8e1957a0d649fc7bf44305012d15a50a4876ab92a92f3f0647ddef85f6287cc98e0dd9966b7da3ad0a8ee6e2db5103143
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Tries to add a device administrator.
-