General
-
Target
4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76
-
Size
1.8MB
-
Sample
220521-d92elahaf5
-
MD5
28e33d3564f8e222d503a67bc89e6289
-
SHA1
cbae48ff8f98ac6d43022648135b69a6c208ed2d
-
SHA256
4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76
-
SHA512
38dc9abdcd81f2e4c79e8443384bac1f2c01d1b3eee9a7a78cd280772dac1746da9b3f863a97f17f2a2a14d71b87a71c7f0f953c2998be8f7d5fe750fa551ece
Static task
static1
Behavioral task
behavioral1
Sample
4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76.apk
Resource
android-x64-20220310-en
Malware Config
Extracted
cerberus
http://hatefraud.com
Targets
-
-
Target
4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76
-
Size
1.8MB
-
MD5
28e33d3564f8e222d503a67bc89e6289
-
SHA1
cbae48ff8f98ac6d43022648135b69a6c208ed2d
-
SHA256
4cce91d4af718275803a9423465bf8c335205b2f0a3b84fbf253c55b5da17c76
-
SHA512
38dc9abdcd81f2e4c79e8443384bac1f2c01d1b3eee9a7a78cd280772dac1746da9b3f863a97f17f2a2a14d71b87a71c7f0f953c2998be8f7d5fe750fa551ece
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Removes a system notification.
-