General
-
Target
Hadise_Ifsa_build_obf.apk
-
Size
1.9MB
-
Sample
220104-r421tshedl
-
MD5
f2b673c2abb56cb6e27164458ebd550b
-
SHA1
8e7df51c99929c8a3d0cece6d1ee081ae24a69f1
-
SHA256
4a6509d3e24da811dbb106243bc3654e5edf7d2c1232febcc07739d513927b2d
-
SHA512
4fc136c010537bc8ba758412f3d96573a5bb5a953e0a081263eeeae747c0a59a72e9582614b4d758428de4072a7dfa6597abacfcec00639f266388350b7cfe2a
Static task
static1
Malware Config
Extracted
cerberus
http://51.81.86.211
Targets
-
-
Target
Hadise_Ifsa_build_obf.apk
-
Size
1.9MB
-
MD5
f2b673c2abb56cb6e27164458ebd550b
-
SHA1
8e7df51c99929c8a3d0cece6d1ee081ae24a69f1
-
SHA256
4a6509d3e24da811dbb106243bc3654e5edf7d2c1232febcc07739d513927b2d
-
SHA512
4fc136c010537bc8ba758412f3d96573a5bb5a953e0a081263eeeae747c0a59a72e9582614b4d758428de4072a7dfa6597abacfcec00639f266388350b7cfe2a
-
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-