General
-
Target
0b8c026dd1d8208aedc6cfc92102f8c105f9b54a50e8cf5a15bd1a5ade83f9da.apk
-
Size
3.0MB
-
Sample
220924-d8kepaaeb8
-
MD5
02a7ce8ecf19f04fc3cdd56bf34e7267
-
SHA1
9c2d21ec470dedd11c38459b68da5d27621dc09d
-
SHA256
0b8c026dd1d8208aedc6cfc92102f8c105f9b54a50e8cf5a15bd1a5ade83f9da
-
SHA512
3f01b5d5cc546f552e707a707f43a3dcf228032c9a121a3dee8d6785a28431322819f1dedd34c9350929e85fd668398cb79ab8e479a1b9cd16b85792c643d3e4
-
SSDEEP
49152:61r+tdKavrnGz8flBlXj3IF4ZwNAQnixwqkv6ZrUx0Wt+3lBeyflT6t3X9cPmlaU:3prGzylHz3PZwNTTv6ZrKw4yfOXiOlaU
Static task
static1
Behavioral task
behavioral1
Sample
0b8c026dd1d8208aedc6cfc92102f8c105f9b54a50e8cf5a15bd1a5ade83f9da.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
0b8c026dd1d8208aedc6cfc92102f8c105f9b54a50e8cf5a15bd1a5ade83f9da.apk
Resource
android-x64-20220823-en
Malware Config
Extracted
cerberus
https://lovertruechat.shop
Targets
-
-
Target
0b8c026dd1d8208aedc6cfc92102f8c105f9b54a50e8cf5a15bd1a5ade83f9da.apk
-
Size
3.0MB
-
MD5
02a7ce8ecf19f04fc3cdd56bf34e7267
-
SHA1
9c2d21ec470dedd11c38459b68da5d27621dc09d
-
SHA256
0b8c026dd1d8208aedc6cfc92102f8c105f9b54a50e8cf5a15bd1a5ade83f9da
-
SHA512
3f01b5d5cc546f552e707a707f43a3dcf228032c9a121a3dee8d6785a28431322819f1dedd34c9350929e85fd668398cb79ab8e479a1b9cd16b85792c643d3e4
-
SSDEEP
49152:61r+tdKavrnGz8flBlXj3IF4ZwNAQnixwqkv6ZrUx0Wt+3lBeyflT6t3X9cPmlaU:3prGzylHz3PZwNTTv6ZrKw4yfOXiOlaU
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-