General

  • Target

    53ebf60490a4d9e16bdc9233e367f142512f6f10efed75b993fe4e2214dcc40f

  • Size

    4.3MB

  • Sample

    220701-gnpqfsgef2

  • MD5

    4e73fb6a8f4679f745145da1c960d372

  • SHA1

    de2fcd36ab2f2e701accf7a78dc9419ff47d5960

  • SHA256

    53ebf60490a4d9e16bdc9233e367f142512f6f10efed75b993fe4e2214dcc40f

  • SHA512

    9932bcd8cfda540041c2dabead3088456ec89902731c8cdfe77762e70ec5dab1685fbd14b19a8146016301220f805f68413181de8f06bee184129ecf72e0cfdb

Score
8/10

Malware Config

Targets

    • Target

      53ebf60490a4d9e16bdc9233e367f142512f6f10efed75b993fe4e2214dcc40f

    • Size

      4.3MB

    • MD5

      4e73fb6a8f4679f745145da1c960d372

    • SHA1

      de2fcd36ab2f2e701accf7a78dc9419ff47d5960

    • SHA256

      53ebf60490a4d9e16bdc9233e367f142512f6f10efed75b993fe4e2214dcc40f

    • SHA512

      9932bcd8cfda540041c2dabead3088456ec89902731c8cdfe77762e70ec5dab1685fbd14b19a8146016301220f805f68413181de8f06bee184129ecf72e0cfdb

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks