General

  • Target

    9133e4470d7f1c8375faa4a5584121bcd30f4b6716da6c39280d25083d8a71e3

  • Size

    3.6MB

  • Sample

    221124-js422sda4x

  • MD5

    86927fcd1511ca96fa5630d3df0a2195

  • SHA1

    ee1dcc6265962b312eba0935444d108f27a13e66

  • SHA256

    9133e4470d7f1c8375faa4a5584121bcd30f4b6716da6c39280d25083d8a71e3

  • SHA512

    2dfc2fe75e376c1bcd254a1ee4d7a1b37b9a446fcd7b7ab5931693992cd413fef2b0e0dd35d0785e3269da2ff44a7c9b0df6092c18682dfecd230e826b938c70

  • SSDEEP

    98304:fLOZH/SJ4+bqWcGS/mr4kx4Ew2Jr1/cS2D4BFlz:z4fSJBbqWcGSOr4s4EwIS4BFlz

Score
8/10

Malware Config

Targets

    • Target

      9133e4470d7f1c8375faa4a5584121bcd30f4b6716da6c39280d25083d8a71e3

    • Size

      3.6MB

    • MD5

      86927fcd1511ca96fa5630d3df0a2195

    • SHA1

      ee1dcc6265962b312eba0935444d108f27a13e66

    • SHA256

      9133e4470d7f1c8375faa4a5584121bcd30f4b6716da6c39280d25083d8a71e3

    • SHA512

      2dfc2fe75e376c1bcd254a1ee4d7a1b37b9a446fcd7b7ab5931693992cd413fef2b0e0dd35d0785e3269da2ff44a7c9b0df6092c18682dfecd230e826b938c70

    • SSDEEP

      98304:fLOZH/SJ4+bqWcGS/mr4kx4Ew2Jr1/cS2D4BFlz:z4fSJBbqWcGSOr4s4EwIS4BFlz

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks