Analysis
-
max time kernel
2153429s -
platform
android_x86 -
resource
android-x86-arm -
submitted
14-10-2021 19:48
Static task
static1
Behavioral task
behavioral1
Sample
Aleyna_Tilki_Ifsa.apk
Resource
android-x86-arm
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Aleyna_Tilki_Ifsa.apk
Resource
android-x64-arm64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
Aleyna_Tilki_Ifsa.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
Aleyna_Tilki_Ifsa.apk
-
Size
2.7MB
-
MD5
1de701e9b870b779c1c244fe1c65f7f1
-
SHA1
e9cd53eeefc3f3c258acecf48b4661bb747955eb
-
SHA256
455900e642599530f1fe934e143a724e5bed50ae63be00aaaeabb124852dba82
-
SHA512
4354c4eb07035bec8f2d9f1b0449a56bea2ebbd3fb91551f136c18a0cb29967fdce87caa8b8365e5aaf9cbffc8fcc38a0621127eb6075308a4513eebf865ebfb
Malware Config
Extracted
Family
cerberus
C2
http://161.97.68.93
Signatures
-
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.snack.dignity/app_DynamicOptDex/ba.json 4967 com.snack.dignity /data/user/0/com.snack.dignity/app_DynamicOptDex/ba.json 4992 /system/bin/dex2oat /data/user/0/com.snack.dignity/app_DynamicOptDex/ba.json 4967 com.snack.dignity -
Uses reflection 1 IoCs
description pid Process Invokes method android.content.pm.PackageManager.isInstantApp 4967 com.snack.dignity