General

  • Target

    796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe

  • Size

    5.6MB

  • Sample

    220520-1alw7aghal

  • MD5

    f56c840d86aca1c68408584582fe6663

  • SHA1

    2a2b4c60c779bd330b29627c4ecbf98f53cc79e7

  • SHA256

    796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe

  • SHA512

    216f6368e37788f68ead2c8ef8868e6738b9693ceb8d820b16053fe519a43388d3da98f02c1eea40c4427df6e23b7cc96067d935970296b1fc9386aac62b77d2

Malware Config

Targets

    • Target

      796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe

    • Size

      5.6MB

    • MD5

      f56c840d86aca1c68408584582fe6663

    • SHA1

      2a2b4c60c779bd330b29627c4ecbf98f53cc79e7

    • SHA256

      796dfc9086b8f459e6a061b2df33ebe30cba8cec5c6f0ca44995b8372c086ffe

    • SHA512

      216f6368e37788f68ead2c8ef8868e6738b9693ceb8d820b16053fe519a43388d3da98f02c1eea40c4427df6e23b7cc96067d935970296b1fc9386aac62b77d2

    Score
    7/10
    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks