General

  • Target

    5e3cba6ea24f663e71cee84df60fb6feb37ba168a51cfa680f859819a0e85448

  • Size

    4.4MB

  • Sample

    221125-kl3fbaec35

  • MD5

    12bbe02d5dcb112e3cedb35239f1ba21

  • SHA1

    e92ea29a995aa8d030a927fda74905fd17855a2a

  • SHA256

    5e3cba6ea24f663e71cee84df60fb6feb37ba168a51cfa680f859819a0e85448

  • SHA512

    7777485ea557fa918b221bfc4933b689b68b86f2927603f5aed6a95a57c99be9b942af13a36e01c2a50dbd4a0862d5f5234dfca9a51f8da45a7b9dc94415150a

  • SSDEEP

    98304:LL3pvvwvZOspKIP70Esu/9g57aChQ1f4f6y/3oN9UQ:LL3pvvoUss47lsO9WGChQ1f4fYN9UQ

Malware Config

Targets

    • Target

      5e3cba6ea24f663e71cee84df60fb6feb37ba168a51cfa680f859819a0e85448

    • Size

      4.4MB

    • MD5

      12bbe02d5dcb112e3cedb35239f1ba21

    • SHA1

      e92ea29a995aa8d030a927fda74905fd17855a2a

    • SHA256

      5e3cba6ea24f663e71cee84df60fb6feb37ba168a51cfa680f859819a0e85448

    • SHA512

      7777485ea557fa918b221bfc4933b689b68b86f2927603f5aed6a95a57c99be9b942af13a36e01c2a50dbd4a0862d5f5234dfca9a51f8da45a7b9dc94415150a

    • SSDEEP

      98304:LL3pvvwvZOspKIP70Esu/9g57aChQ1f4f6y/3oN9UQ:LL3pvvoUss47lsO9WGChQ1f4fYN9UQ

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks