General

  • Target

    0d4b7a8bf35bcd10d324f05c94ed0b9e5367d57d4501d8dd678cc92f7c9073ca

  • Size

    603KB

  • Sample

    210614-ab6lz9fqm6

  • MD5

    68dae9b07711e02ef8e588e2f20f9533

  • SHA1

    75cf6e5e15abf75bf68c6ef6b9c44d08ae1f3cd3

  • SHA256

    0d4b7a8bf35bcd10d324f05c94ed0b9e5367d57d4501d8dd678cc92f7c9073ca

  • SHA512

    77d1cb3e07bce13ed69efa57e8b89047c22ce9c08c67868e178a977c495f224042471f40de6a93d769da6a8f00ca3a38804cb88891db039d2c328b49ad295946

Score
8/10

Malware Config

Targets

    • Target

      0d4b7a8bf35bcd10d324f05c94ed0b9e5367d57d4501d8dd678cc92f7c9073ca

    • Size

      603KB

    • MD5

      68dae9b07711e02ef8e588e2f20f9533

    • SHA1

      75cf6e5e15abf75bf68c6ef6b9c44d08ae1f3cd3

    • SHA256

      0d4b7a8bf35bcd10d324f05c94ed0b9e5367d57d4501d8dd678cc92f7c9073ca

    • SHA512

      77d1cb3e07bce13ed69efa57e8b89047c22ce9c08c67868e178a977c495f224042471f40de6a93d769da6a8f00ca3a38804cb88891db039d2c328b49ad295946

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks