General
-
Target
ae338ecd0e84e30cb0962d26ea2797cb
-
Size
3.2MB
-
Sample
240229-lp25dsdd96
-
MD5
ae338ecd0e84e30cb0962d26ea2797cb
-
SHA1
04d1634a310fa44282d8abe6763dfd851d84c4d4
-
SHA256
4a3d77f8c3e8d8ecbbfeda70b661f57dc4d2382996615938c71de6a4cfc2f03f
-
SHA512
9cd57469232cc692b4321df7eb1b630426f2921611801221212b8abd2a5a75b95d811a43835e8030222c8ca105c0eed850152e4f2c850d34bd1ffccd1c233aa8
-
SSDEEP
49152:s5V2pYyoevMC7JZ2AMrvHGFOWkMHlkOIdrg3nD2nexrqP+BNfEsholdZOOUkv:5ToekpepQW6neh7ei4v
Static task
static1
Behavioral task
behavioral1
Sample
ae338ecd0e84e30cb0962d26ea2797cb.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
ae338ecd0e84e30cb0962d26ea2797cb.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
ae338ecd0e84e30cb0962d26ea2797cb.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
cerberus
http://sallamadamarmy100.xyz
Targets
-
-
Target
ae338ecd0e84e30cb0962d26ea2797cb
-
Size
3.2MB
-
MD5
ae338ecd0e84e30cb0962d26ea2797cb
-
SHA1
04d1634a310fa44282d8abe6763dfd851d84c4d4
-
SHA256
4a3d77f8c3e8d8ecbbfeda70b661f57dc4d2382996615938c71de6a4cfc2f03f
-
SHA512
9cd57469232cc692b4321df7eb1b630426f2921611801221212b8abd2a5a75b95d811a43835e8030222c8ca105c0eed850152e4f2c850d34bd1ffccd1c233aa8
-
SSDEEP
49152:s5V2pYyoevMC7JZ2AMrvHGFOWkMHlkOIdrg3nD2nexrqP+BNfEsholdZOOUkv:5ToekpepQW6neh7ei4v
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Listens for changes in the sensor environment (might be used to detect emulation)
-