General
-
Target
135e116b58156421ca82e964c2bc62f8
-
Size
3.9MB
-
Sample
231230-kbzaxacfa4
-
MD5
135e116b58156421ca82e964c2bc62f8
-
SHA1
0fbe0ab9fdcdc03774304aa0130b1207d50eb1e5
-
SHA256
46f13df8a54b8abc7750efb70c9a5da82b9e65c68e071f2d1cc1a22aba360dca
-
SHA512
a9a0df066028a266bbd4d1b6fbc9d4e3f095c25a0355813d6325d6aa05232d38f3accc3fec03e71b629482763c6a6c26b0b39e4a9f79d3b771efb91e4bec9144
-
SSDEEP
98304:0+ITvw1LJfwtBJQqaX5jwSvKKGLhqaTAQFFCczMWQY:0+ITv2LFw9S5heqaTZCGQY
Static task
static1
Behavioral task
behavioral1
Sample
135e116b58156421ca82e964c2bc62f8.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
135e116b58156421ca82e964c2bc62f8.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
135e116b58156421ca82e964c2bc62f8.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
cerberus
http://51.195.255.1
Targets
-
-
Target
135e116b58156421ca82e964c2bc62f8
-
Size
3.9MB
-
MD5
135e116b58156421ca82e964c2bc62f8
-
SHA1
0fbe0ab9fdcdc03774304aa0130b1207d50eb1e5
-
SHA256
46f13df8a54b8abc7750efb70c9a5da82b9e65c68e071f2d1cc1a22aba360dca
-
SHA512
a9a0df066028a266bbd4d1b6fbc9d4e3f095c25a0355813d6325d6aa05232d38f3accc3fec03e71b629482763c6a6c26b0b39e4a9f79d3b771efb91e4bec9144
-
SSDEEP
98304:0+ITvw1LJfwtBJQqaX5jwSvKKGLhqaTAQFFCczMWQY:0+ITv2LFw9S5heqaTZCGQY
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-