MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c81234b6ceb3572c6d862a9313e019b98efd83165d8c085bd3e74971c66763bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cerberus


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: c81234b6ceb3572c6d862a9313e019b98efd83165d8c085bd3e74971c66763bb
SHA3-384 hash: 202531a13551879bea5396aa8b8ff922c8efaaadb3c00d5732a3ff54e2b01b46a13e0ff1cb9b5b4d3f7651df080a2a0f
SHA1 hash: 9cddff2056ccfcfbd30d3ed50651a45c69a5e840
MD5 hash: 3f3bef2f188d420c30c2616cc74c69e5
humanhash: hot-alabama-indigo-lake
File name:c81234b6ceb3572c6d862a9313e019b98efd83165d8c085bd3e74971c66763bb_video.apk
Download: download sample
Signature Cerberus
File size:2'121'030 bytes
First seen:2022-12-15 11:09:47 UTC
Last seen:Never
File type: apk
MIME type:application/zip
ssdeep 49152:ywkDVrfNOesuX/0KjKooHMzWwyuyjrlUy7HOWwU6:ywkDxfgesuX/0KjKoaM6v7jey7vw1
TLSH T1DBA533CF0A905A60D8932E3146660643D7BB5359430BAA8F302F02569FB3FD55F698FE
TrID 49.3% (.APK) Android Package (38500/1/9)
17.9% (.ZIP) Opera Widget (14000/1/2)
17.3% (.JAR) Java Archive (13500/1/2)
8.9% (.MAFF) Mozilla Archive Format (gen) (7000/1/1)
5.1% (.ZIP) ZIP compressed archive (4000/1)
Reporter AykutBasi
Tags:apk Cerberus signed

Code Signing Certificate

Organisation:Android
Issuer:Android
Algorithm:sha1WithRSAEncryption
Valid from:2008-02-29T01:33:46Z
Valid to:2035-07-17T01:33:46Z
Serial number: 936eacbe07f201df
Intelligence: 1778 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: a40da80a59d170caa950cf15c18c454d47a39b26989d8b640ecd745ba71bf5dc
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
494
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Result
Application Permissions
read/modify/delete external storage contents (WRITE_EXTERNAL_STORAGE)
read external storage contents (READ_EXTERNAL_STORAGE)
send SMS messages (SEND_SMS)
Allows an application to request installing packages. (REQUEST_INSTALL_PACKAGES)
directly call phone numbers (CALL_PHONE)
record audio (RECORD_AUDIO)
retrieve running applications (GET_TASKS)
list accounts (GET_ACCOUNTS)
read phone state and identity (READ_PHONE_STATE)
allow application to recognize physical activity (ACTIVITY_RECOGNITION)
read contact data (READ_CONTACTS)
display system-level alerts (SYSTEM_ALERT_WINDOW)
read SMS or MMS (READ_SMS)
receive SMS (RECEIVE_SMS)
automatically start at boot (RECEIVE_BOOT_COMPLETED)
access extra location provider commands (ACCESS_LOCATION_EXTRA_COMMANDS)
measure application storage space (GET_PACKAGE_SIZE)
full Internet access (INTERNET)
prevent phone from sleeping (WAKE_LOCK)
allow use of fingerprint (USE_FINGERPRINT)
view Wi-Fi status (ACCESS_WIFI_STATE)
view network status (ACCESS_NETWORK_STATE)
change Wi-Fi status (CHANGE_WIFI_STATE)
create Bluetooth connections (BLUETOOTH)
Result
Threat name:
Cerberus
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
Access the class loader (often done to load a new code)
Accesses FileOutputStream via Reflection
Antivirus / Scanner detection for submitted sample
Deletes other packages
Detected Cerberus Banking Trojan
Drops a new APK file
Loads new DEX files via dynamic constructor
Multi AV Scanner detection for submitted file
Removes its application launcher (likely to stay hidden)
Requests to ignore battery optimizations
Starts/registers a service/receiver on screen off
Tries to disable the administrator user
Behaviour
Behavior Graph:
n/a
Threat name:
Android.Dropper.Hqwar
Status:
Malicious
First seen:
2022-12-12 15:51:33 UTC
File Type:
Binary (Archive)
Extracted files:
148
AV detection:
9 of 24 (37.50%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
android evasion
Behaviour
Removes a system notification.
Acquires the wake lock.
Loads dropped Dex/Jar
Makes use of the framework's Accessibility service.
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments