General
-
Target
5726e0488c2e43f9776104aec2cd8088d748755a94fca57f2f6d5705afdf6357.apk
-
Size
178KB
-
Sample
211108-tnrw2acfd4
-
MD5
956fc88cfa48c7a2512be68c70c9822e
-
SHA1
7827228f6a3a4c703d4074c684858b5d395cc2dd
-
SHA256
5726e0488c2e43f9776104aec2cd8088d748755a94fca57f2f6d5705afdf6357
-
SHA512
2851ff019a8af1938a82003fbb7c52f86bcb5e3a8bf922e19150f9cfb0ebdd99bbae9571dff39c94ade8148b61f33af782c742d86e38bc9f75d09d654a932940
Static task
static1
Malware Config
Extracted
cerberus
https://herhavuzundibiayni.com
Targets
-
-
Target
5726e0488c2e43f9776104aec2cd8088d748755a94fca57f2f6d5705afdf6357.apk
-
Size
178KB
-
MD5
956fc88cfa48c7a2512be68c70c9822e
-
SHA1
7827228f6a3a4c703d4074c684858b5d395cc2dd
-
SHA256
5726e0488c2e43f9776104aec2cd8088d748755a94fca57f2f6d5705afdf6357
-
SHA512
2851ff019a8af1938a82003fbb7c52f86bcb5e3a8bf922e19150f9cfb0ebdd99bbae9571dff39c94ade8148b61f33af782c742d86e38bc9f75d09d654a932940
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-