General
-
Target
2a0f193c0fea901247ab7940f37b43b846069e3eba698b8161d7bcbf0fdf1154.apk
-
Size
3.8MB
-
Sample
210805-cgpg7dm8qj
-
MD5
7fcb00969d7eaf0649ada4125a7b5cf0
-
SHA1
2f8ff855a1620bd2aca4ebc0f4cce9c28cd31f77
-
SHA256
2a0f193c0fea901247ab7940f37b43b846069e3eba698b8161d7bcbf0fdf1154
-
SHA512
c825b2770a7e0c1a27218a6beaa9e7a6a5a00fdf6d79ea666b6cab63ea329ea2c3d2d51cc5ab54457e03dad3fc56737f0c50a16fc9b7a81f95f41b91ee7cddca
Static task
static1
Behavioral task
behavioral1
Sample
2a0f193c0fea901247ab7940f37b43b846069e3eba698b8161d7bcbf0fdf1154.apk
Resource
android-x86-arm
Malware Config
Extracted
cerberus
http://phoeinxbalendin.cf
Targets
-
-
Target
2a0f193c0fea901247ab7940f37b43b846069e3eba698b8161d7bcbf0fdf1154.apk
-
Size
3.8MB
-
MD5
7fcb00969d7eaf0649ada4125a7b5cf0
-
SHA1
2f8ff855a1620bd2aca4ebc0f4cce9c28cd31f77
-
SHA256
2a0f193c0fea901247ab7940f37b43b846069e3eba698b8161d7bcbf0fdf1154
-
SHA512
c825b2770a7e0c1a27218a6beaa9e7a6a5a00fdf6d79ea666b6cab63ea329ea2c3d2d51cc5ab54457e03dad3fc56737f0c50a16fc9b7a81f95f41b91ee7cddca
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-