General
-
Target
Androidupdate_2.apk
-
Size
2.8MB
-
Sample
211017-ydtp4achb3
-
MD5
4ed6bfe741982803744054d497744180
-
SHA1
9e8feaac343f2e43b1eb0cd0437ca59869164ebf
-
SHA256
33f9c3fdb345146fc95dbe2bf2ea18d0cf7c1a64620862019c88c99f0f7726ab
-
SHA512
f446ba7dea2f273fb264c7790d4b2dc3313ffeaf339821a473206cbf70a529bafafd8a6296feb811245bfacf269517cb78ed6d296e6effd01ac52911a4047ff7
Static task
static1
Behavioral task
behavioral1
Sample
Androidupdate_2.apk
Resource
android-x86-arm
Malware Config
Extracted
cerberus
http://20.90.106.208/
Targets
-
-
Target
Androidupdate_2.apk
-
Size
2.8MB
-
MD5
4ed6bfe741982803744054d497744180
-
SHA1
9e8feaac343f2e43b1eb0cd0437ca59869164ebf
-
SHA256
33f9c3fdb345146fc95dbe2bf2ea18d0cf7c1a64620862019c88c99f0f7726ab
-
SHA512
f446ba7dea2f273fb264c7790d4b2dc3313ffeaf339821a473206cbf70a529bafafd8a6296feb811245bfacf269517cb78ed6d296e6effd01ac52911a4047ff7
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-