General
-
Target
1d755806e0b3de29faf431c891921c2a
-
Size
3.9MB
-
Sample
231230-1l8v4aefbk
-
MD5
1d755806e0b3de29faf431c891921c2a
-
SHA1
73aeceebd43de7fb385deb42f1352bd7d35335ba
-
SHA256
203ff08786e36953f9a8fcf27cc28edfc4cac0d6e02e5f43e6c236f37a428b33
-
SHA512
de95e9c1c24ede26cb81a5f9adbb65717a0c1da5f63ddb39d6f9cf1fc97176af07966e745f4f66e599f4c781eb1eb74cb3f02b10a9385c510635448f5c984661
-
SSDEEP
98304:OUaonkMLwTeks5cSA9YUa90w7CKbbC8JefCMyhJ5u3CD8:oonkML4eks5cSGG2INbCwT+H
Static task
static1
Behavioral task
behavioral1
Sample
1d755806e0b3de29faf431c891921c2a.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
1d755806e0b3de29faf431c891921c2a.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
1d755806e0b3de29faf431c891921c2a.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
cerberus
http://systemsettings.cf
Targets
-
-
Target
1d755806e0b3de29faf431c891921c2a
-
Size
3.9MB
-
MD5
1d755806e0b3de29faf431c891921c2a
-
SHA1
73aeceebd43de7fb385deb42f1352bd7d35335ba
-
SHA256
203ff08786e36953f9a8fcf27cc28edfc4cac0d6e02e5f43e6c236f37a428b33
-
SHA512
de95e9c1c24ede26cb81a5f9adbb65717a0c1da5f63ddb39d6f9cf1fc97176af07966e745f4f66e599f4c781eb1eb74cb3f02b10a9385c510635448f5c984661
-
SSDEEP
98304:OUaonkMLwTeks5cSA9YUa90w7CKbbC8JefCMyhJ5u3CD8:oonkML4eks5cSGG2INbCwT+H
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-