General
-
Target
a2249b8a546435c9585dc532f65064d886d60024fae0b86aa83c79532631ac7b
-
Size
2.7MB
-
Sample
210416-ll1qb63l2s
-
MD5
dd3de24e68d581b3671a03311b2014a1
-
SHA1
3b1a79913ff49765ad82415c232221c2c50ea717
-
SHA256
a2249b8a546435c9585dc532f65064d886d60024fae0b86aa83c79532631ac7b
-
SHA512
7451fd7499a7ca211f1338cefc908a86b56af71f3a5fdff76013e4578b1f0c06f95cd5532cde21473409896c00e80f4c3789b1d643eacc069a2f7c6e1c9c21e3
Static task
static1
Behavioral task
behavioral1
Sample
a2249b8a546435c9585dc532f65064d886d60024fae0b86aa83c79532631ac7b.apk
Resource
android-x86_64
Malware Config
Extracted
cerberus
http://161.97.185.179/
Targets
-
-
Target
a2249b8a546435c9585dc532f65064d886d60024fae0b86aa83c79532631ac7b
-
Size
2.7MB
-
MD5
dd3de24e68d581b3671a03311b2014a1
-
SHA1
3b1a79913ff49765ad82415c232221c2c50ea717
-
SHA256
a2249b8a546435c9585dc532f65064d886d60024fae0b86aa83c79532631ac7b
-
SHA512
7451fd7499a7ca211f1338cefc908a86b56af71f3a5fdff76013e4578b1f0c06f95cd5532cde21473409896c00e80f4c3789b1d643eacc069a2f7c6e1c9c21e3
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Tries to add a device administrator.
-