General

  • Target

    6eb9e5b879ab3088872a755b86ae6f928df3927fdbab30ab0d7a8469902c3779

  • Size

    698KB

  • Sample

    221124-dyndlaeb26

  • MD5

    ed7449badd2587db4cc2a16586b0d26c

  • SHA1

    30441d6f70304fdefb84d983a99a99a1007d25de

  • SHA256

    6eb9e5b879ab3088872a755b86ae6f928df3927fdbab30ab0d7a8469902c3779

  • SHA512

    d8a5e82813e20521ecc2da0797ae567d6806a3a651c74da470b92dc5a094cc9604a855f2d95c32da383774777d929e4662e0cac4391a3f041faa2bd279f61685

  • SSDEEP

    12288:K2OpM8dzoYuSlWDWFJLASmn/lVl6laPLUG8Q4cMtczvtVROi6CGe8eAPhq:oXdzoYpMGJESy/jAUYOMt2r8iwet+hq

Score
7/10

Malware Config

Targets

    • Target

      6eb9e5b879ab3088872a755b86ae6f928df3927fdbab30ab0d7a8469902c3779

    • Size

      698KB

    • MD5

      ed7449badd2587db4cc2a16586b0d26c

    • SHA1

      30441d6f70304fdefb84d983a99a99a1007d25de

    • SHA256

      6eb9e5b879ab3088872a755b86ae6f928df3927fdbab30ab0d7a8469902c3779

    • SHA512

      d8a5e82813e20521ecc2da0797ae567d6806a3a651c74da470b92dc5a094cc9604a855f2d95c32da383774777d929e4662e0cac4391a3f041faa2bd279f61685

    • SSDEEP

      12288:K2OpM8dzoYuSlWDWFJLASmn/lVl6laPLUG8Q4cMtczvtVROi6CGe8eAPhq:oXdzoYpMGJESy/jAUYOMt2r8iwet+hq

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks