General

  • Target

    2e5656c44e5911311b3f68eddbc1f50ae8f3193f6be05d308c3d146baca52997

  • Size

    9.5MB

  • Sample

    221125-k3c7raaf7s

  • MD5

    f414edfd28b02d6a80f7549476e441da

  • SHA1

    af028d184599515b31c92fcc7ea87f19b6cee735

  • SHA256

    2e5656c44e5911311b3f68eddbc1f50ae8f3193f6be05d308c3d146baca52997

  • SHA512

    0566871e0b82902d885944ad1e93d5ae15415531433f77e1788c445e4013ff2254b1f98d80bae71e6949e45b6f3aaaf346b1b661b47bf43ddd0bfc9bda0026cc

  • SSDEEP

    196608:WyrlwzhEmYpbfGJhdOxwtIonuhgFT+fL+qdcRj2R3hZn6zsHr8M1e:WyrlEWmYJGJh0wWRgFKL+qdcRj25Ear+

Score
7/10

Malware Config

Targets

    • Target

      2e5656c44e5911311b3f68eddbc1f50ae8f3193f6be05d308c3d146baca52997

    • Size

      9.5MB

    • MD5

      f414edfd28b02d6a80f7549476e441da

    • SHA1

      af028d184599515b31c92fcc7ea87f19b6cee735

    • SHA256

      2e5656c44e5911311b3f68eddbc1f50ae8f3193f6be05d308c3d146baca52997

    • SHA512

      0566871e0b82902d885944ad1e93d5ae15415531433f77e1788c445e4013ff2254b1f98d80bae71e6949e45b6f3aaaf346b1b661b47bf43ddd0bfc9bda0026cc

    • SSDEEP

      196608:WyrlwzhEmYpbfGJhdOxwtIonuhgFT+fL+qdcRj2R3hZn6zsHr8M1e:WyrlEWmYJGJh0wWRgFKL+qdcRj25Ear+

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks