General
-
Target
Androidupdate.apk
-
Size
2.6MB
-
Sample
210420-e5v972yvla
-
MD5
e6122601d0025dce56d420a66b6aadba
-
SHA1
dae25433a7a016f5fff5610209ff27ba78b33e2d
-
SHA256
72947cc5aaeda9164442abb39abba89a977445c3f90d3abf9f07ae1498fffcec
-
SHA512
96f776e932e2a6cdf7865d6c41b8bd112347c98b3f47a2ce3941bb2fb84af5eeca2c9e9923665aa4c5e7b13ad6b2863b20181095da250189f7383471030d76e9
Static task
static1
Behavioral task
behavioral1
Sample
Androidupdate.apk
Resource
android-x86_64
Malware Config
Extracted
cerberus
http://20.190.192.187/
Targets
-
-
Target
Androidupdate.apk
-
Size
2.6MB
-
MD5
e6122601d0025dce56d420a66b6aadba
-
SHA1
dae25433a7a016f5fff5610209ff27ba78b33e2d
-
SHA256
72947cc5aaeda9164442abb39abba89a977445c3f90d3abf9f07ae1498fffcec
-
SHA512
96f776e932e2a6cdf7865d6c41b8bd112347c98b3f47a2ce3941bb2fb84af5eeca2c9e9923665aa4c5e7b13ad6b2863b20181095da250189f7383471030d76e9
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Tries to add a device administrator.
-