Analysis
-
max time kernel
2153432s -
platform
android_x86 -
resource
android-x86-arm -
submitted
14-10-2021 19:48
Static task
static1
Behavioral task
behavioral1
Sample
Aleyna_Tilki_Ifsa.apk
Resource
android-x86-arm
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Aleyna_Tilki_Ifsa.apk
Resource
android-x64-arm64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
Aleyna_Tilki_Ifsa.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
Aleyna_Tilki_Ifsa.apk
-
Size
2.7MB
-
MD5
f50a8b6f416d2efb30fe6b2b5f83b9da
-
SHA1
da162c0a3ae612ee779ff781e60b4362880fc7a8
-
SHA256
cf3bd3c242555867a1e6bdd07e7c9dcc5df5ba5cf15e24ed12ac7e1bc533f829
-
SHA512
ed3663d0a26262080617d1d7d4e665b772468bfb0f4f9e65fac79649a4db9ee5eeb624e79372a3c50abc4537380e4512484397ae3d6c8cb72a882647598669f7
Malware Config
Extracted
Family
cerberus
C2
http://161.97.68.93
Signatures
-
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.denial.mirror/app_DynamicOptDex/FwXIUUa.json 4862 com.denial.mirror /data/user/0/com.denial.mirror/app_DynamicOptDex/FwXIUUa.json 4886 /system/bin/dex2oat /data/user/0/com.denial.mirror/app_DynamicOptDex/FwXIUUa.json 4862 com.denial.mirror -
Uses reflection 1 IoCs
description pid Process Invokes method android.content.pm.PackageManager.isInstantApp 4862 com.denial.mirror