General
-
Target
635a7d30df87a8bbbbeedfe0d5da7891
-
Size
3.2MB
-
Sample
240117-xnvjpsddd6
-
MD5
635a7d30df87a8bbbbeedfe0d5da7891
-
SHA1
d8f08f117f7c79732f12c6b11538eefab8bc93e8
-
SHA256
c6f35accd37dc1440ff1fe474d6e4dc94be2e58cebc66dca6c6d860a8c2bc4ad
-
SHA512
adbe51d5f490e39e43f8ce4662c2d5e4c8ec69ada42bb6a9b4353f65423eac1b6d3e3ca388b5c880915b7eca2fad20e762df821061fe67c6d942f698c0afee20
-
SSDEEP
49152:4Ww5YLWU0U6oWqDXxeOTECxEWEQv9lOHBLRPE9iV9iLEecArrP7X+8k54K6SZmA0:jLWlU/TYul489iV9iLB3DX+DqfS45Whm
Static task
static1
Behavioral task
behavioral1
Sample
635a7d30df87a8bbbbeedfe0d5da7891.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
635a7d30df87a8bbbbeedfe0d5da7891.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
635a7d30df87a8bbbbeedfe0d5da7891.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
cerberus
https://ourcoming.com
Targets
-
-
Target
635a7d30df87a8bbbbeedfe0d5da7891
-
Size
3.2MB
-
MD5
635a7d30df87a8bbbbeedfe0d5da7891
-
SHA1
d8f08f117f7c79732f12c6b11538eefab8bc93e8
-
SHA256
c6f35accd37dc1440ff1fe474d6e4dc94be2e58cebc66dca6c6d860a8c2bc4ad
-
SHA512
adbe51d5f490e39e43f8ce4662c2d5e4c8ec69ada42bb6a9b4353f65423eac1b6d3e3ca388b5c880915b7eca2fad20e762df821061fe67c6d942f698c0afee20
-
SSDEEP
49152:4Ww5YLWU0U6oWqDXxeOTECxEWEQv9lOHBLRPE9iV9iLEecArrP7X+8k54K6SZmA0:jLWlU/TYul489iV9iLB3DX+DqfS45Whm
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-