Analysis
-
max time kernel
2541104s -
max time network
241s -
platform
android_x64 -
resource
android-x64 -
submitted
19-10-2021 07:27
Static task
static1
Behavioral task
behavioral1
Sample
14e348c5c81b59f8a56bb09bdf5768d28fbe87339a7c543d6707249ebee4f6d0.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
14e348c5c81b59f8a56bb09bdf5768d28fbe87339a7c543d6707249ebee4f6d0.apk
Resource
android-x64-arm64
General
-
Target
14e348c5c81b59f8a56bb09bdf5768d28fbe87339a7c543d6707249ebee4f6d0.apk
-
Size
240KB
-
MD5
e18dd20ad2db25cb9f63afd4d471b20f
-
SHA1
631a22ae8bf03d83c1b2b5aceee18660a70d7a41
-
SHA256
14e348c5c81b59f8a56bb09bdf5768d28fbe87339a7c543d6707249ebee4f6d0
-
SHA512
164389107bec4231133fd6787a579eac2bbe80e82dbded4b09a4cd684580217072bb2b32339e152c0b0afab7d929c01d65c56414449e8fdae3f36256c607b60f
Malware Config
Extracted
cerberus
https://kaleninorasidere.com
Signatures
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.kmzdamgqlupjwuqe.vcolfrgnzdgwazo/app_apk/system.apk 3638 com.kmzdamgqlupjwuqe.vcolfrgnzdgwazo -
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation). 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.kmzdamgqlupjwuqe.vcolfrgnzdgwazo