General
-
Target
FAST.apk
-
Size
3.1MB
-
Sample
210807-cdhjwhck66
-
MD5
d38149d82ed66c24d5acd62ad4bfc3b3
-
SHA1
74c318254e3f59eb83ef22e6dffe024ff9397b34
-
SHA256
068776971541ada38dea1e7bf666d877bc0e67785e854205f84385f14f5c4dea
-
SHA512
268eed1d17be3bb02bc624abeaf06bedaa5fba8061856560a8aea31fcf0b72116c8c74f6b226756053552215c49c36bd84d551cab9e72642bb841f7eb3a3ff22
Static task
static1
Behavioral task
behavioral1
Sample
FAST.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
FAST.apk
Resource
android-x64-arm64
Behavioral task
behavioral3
Sample
FAST.apk
Resource
android-x64
Malware Config
Extracted
cerberus
http://72.10.160.51
Targets
-
-
Target
FAST.apk
-
Size
3.1MB
-
MD5
d38149d82ed66c24d5acd62ad4bfc3b3
-
SHA1
74c318254e3f59eb83ef22e6dffe024ff9397b34
-
SHA256
068776971541ada38dea1e7bf666d877bc0e67785e854205f84385f14f5c4dea
-
SHA512
268eed1d17be3bb02bc624abeaf06bedaa5fba8061856560a8aea31fcf0b72116c8c74f6b226756053552215c49c36bd84d551cab9e72642bb841f7eb3a3ff22
-
suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad
suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-