General
-
Target
199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d
-
Size
1.5MB
-
Sample
220521-pjznvsfdg4
-
MD5
9f0a014aaf851875c4e77f5dd980c68c
-
SHA1
7f2d4e6e9666d9d18c270c983b3b885e02715e52
-
SHA256
199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d
-
SHA512
e3225e0002a1cecb05bccc7788e950bd62d290ca73197366078442287461e65d81eee92ba891b1bf886af605c74125bbb0ce09d51830738cab02b19efa095829
Static task
static1
Behavioral task
behavioral1
Sample
199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Extracted
cerberus
http://android244.ru
Targets
-
-
Target
199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d
-
Size
1.5MB
-
MD5
9f0a014aaf851875c4e77f5dd980c68c
-
SHA1
7f2d4e6e9666d9d18c270c983b3b885e02715e52
-
SHA256
199c27a457117334eab655b3811d24eb77f121562518f0bdf06edb676ed5845d
-
SHA512
e3225e0002a1cecb05bccc7788e950bd62d290ca73197366078442287461e65d81eee92ba891b1bf886af605c74125bbb0ce09d51830738cab02b19efa095829
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Removes a system notification.
-