General
-
Target
Flashplayer.....apk
-
Size
4.0MB
-
Sample
210420-aqbs1h1k9a
-
MD5
b2d77459b93ea208e0567e648f4244d0
-
SHA1
850db541816850c12e53970c0d4b3f2a36c464ef
-
SHA256
80b543537957e43444cf5adaf27a152318a97cf115ce97e4e4f104c761257a49
-
SHA512
93caa5c973879dd8b067cfbc7d19eb1d16a11ebe515a95797c595b2bb2e5b2ab5ad14d45a1c719381be898a7ff67d925363a0999fac0ff668a8857053c113ee4
Static task
static1
Behavioral task
behavioral1
Sample
Flashplayer.....apk
Resource
android-x86_arm
Malware Config
Extracted
cerberus
http://144.76.80.117
Targets
-
-
Target
Flashplayer.....apk
-
Size
4.0MB
-
MD5
b2d77459b93ea208e0567e648f4244d0
-
SHA1
850db541816850c12e53970c0d4b3f2a36c464ef
-
SHA256
80b543537957e43444cf5adaf27a152318a97cf115ce97e4e4f104c761257a49
-
SHA512
93caa5c973879dd8b067cfbc7d19eb1d16a11ebe515a95797c595b2bb2e5b2ab5ad14d45a1c719381be898a7ff67d925363a0999fac0ff668a8857053c113ee4
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Tries to add a device administrator.
-