General
-
Target
08a3c95c6cb6e779c295ada6f07afa6d
-
Size
3.9MB
-
Sample
231225-gcgkpsgdck
-
MD5
08a3c95c6cb6e779c295ada6f07afa6d
-
SHA1
49e42437bded58e4ed7533144775cf43e7eaf7d9
-
SHA256
92c9819efea87088865bea931870dd66fd58bfa940c80c2bb63a9601ba8d92cf
-
SHA512
c7224f362292af44fe728381eb66cb65a60cf13a22ac853718beb049469acea17fb94f31c0c3fb632122875d3e66bfb9a370b36cd05ecf3649a4b293a5cedcc2
-
SSDEEP
98304:nK7CrwRTd7dK7wWZcbwuDKVdj1YoZVpeT8eQvwzpERz32L:nK7CrWTdZXNAdjioZVUcE83u
Static task
static1
Behavioral task
behavioral1
Sample
08a3c95c6cb6e779c295ada6f07afa6d.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
08a3c95c6cb6e779c295ada6f07afa6d.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
08a3c95c6cb6e779c295ada6f07afa6d.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
cerberus
http://178.18.251.169
Targets
-
-
Target
08a3c95c6cb6e779c295ada6f07afa6d
-
Size
3.9MB
-
MD5
08a3c95c6cb6e779c295ada6f07afa6d
-
SHA1
49e42437bded58e4ed7533144775cf43e7eaf7d9
-
SHA256
92c9819efea87088865bea931870dd66fd58bfa940c80c2bb63a9601ba8d92cf
-
SHA512
c7224f362292af44fe728381eb66cb65a60cf13a22ac853718beb049469acea17fb94f31c0c3fb632122875d3e66bfb9a370b36cd05ecf3649a4b293a5cedcc2
-
SSDEEP
98304:nK7CrwRTd7dK7wWZcbwuDKVdj1YoZVpeT8eQvwzpERz32L:nK7CrWTdZXNAdjioZVUcE83u
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-