General
-
Target
TR_DEV_PORNO.apk
-
Size
2.8MB
-
Sample
211011-27d4aaadcm
-
MD5
f8106603bfede22394a73d2fb0a082f0
-
SHA1
628f5fc3a684aeffb6eef6b8e7cd83c916776ca7
-
SHA256
c5888a824cba71e4c6ebca35aad174120f8b681e48af867dfa95ef6a4ba0dc25
-
SHA512
52d77a5f9f5d8099d7c2129e5de00073b49d5e8a4fd62dbc7a39a91ab92ae59c2f0e139b4e966cbd38f5d883534a15a6091735b0aaf8b4b359e40c5235b18021
Static task
static1
Behavioral task
behavioral1
Sample
TR_DEV_PORNO.apk
Resource
android-x64
Malware Config
Extracted
cerberus
http://144.91.116.117
Targets
-
-
Target
TR_DEV_PORNO.apk
-
Size
2.8MB
-
MD5
f8106603bfede22394a73d2fb0a082f0
-
SHA1
628f5fc3a684aeffb6eef6b8e7cd83c916776ca7
-
SHA256
c5888a824cba71e4c6ebca35aad174120f8b681e48af867dfa95ef6a4ba0dc25
-
SHA512
52d77a5f9f5d8099d7c2129e5de00073b49d5e8a4fd62dbc7a39a91ab92ae59c2f0e139b4e966cbd38f5d883534a15a6091735b0aaf8b4b359e40c5235b18021
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-