General

  • Target

    cec8833306b24c3335019c6446ab221cec85dc1463c1bc4a9a3d7dff59771b4c

  • Size

    24.8MB

  • Sample

    220701-hx74tsagg2

  • MD5

    2eab09b9b157165dd9c28840728d1ace

  • SHA1

    31b4fd697da97965961bcbe7d2e29193d6719cb0

  • SHA256

    cec8833306b24c3335019c6446ab221cec85dc1463c1bc4a9a3d7dff59771b4c

  • SHA512

    6cafa2d8dad1f3451f6bd7b0fd8da639bffbc840890d8c6356376aeac79abb5ab6848eedefb5359759c3e0dc991dd9fa49311ee8774824c2d042c1df3cda2aa8

Score
7/10

Malware Config

Targets

    • Target

      cec8833306b24c3335019c6446ab221cec85dc1463c1bc4a9a3d7dff59771b4c

    • Size

      24.8MB

    • MD5

      2eab09b9b157165dd9c28840728d1ace

    • SHA1

      31b4fd697da97965961bcbe7d2e29193d6719cb0

    • SHA256

      cec8833306b24c3335019c6446ab221cec85dc1463c1bc4a9a3d7dff59771b4c

    • SHA512

      6cafa2d8dad1f3451f6bd7b0fd8da639bffbc840890d8c6356376aeac79abb5ab6848eedefb5359759c3e0dc991dd9fa49311ee8774824c2d042c1df3cda2aa8

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks