General

  • Target

    54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7

  • Size

    4.6MB

  • Sample

    221125-l1y7wach2y

  • MD5

    b45fa7f5250c25d999da645a498ac026

  • SHA1

    85efc4e36a8c20e3216be0277e44407015578478

  • SHA256

    54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7

  • SHA512

    d96533a5c4053cbbf6b1b85da4fb0ad6ff851c672db8e3bb5a576201f7f51e58aa8bcbc51cb3b439634fb2d753b5986aac2f1759c990524c1c49dc3cc3d1fa84

  • SSDEEP

    98304:xB/7jU4RFtmNMFK9UFZJOFtwC3xFfBLPvsUncTCPh+RHmEPH5mf:xBc4QNIwUFZJaDhF5js4cmyfhk

Malware Config

Targets

    • Target

      54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7

    • Size

      4.6MB

    • MD5

      b45fa7f5250c25d999da645a498ac026

    • SHA1

      85efc4e36a8c20e3216be0277e44407015578478

    • SHA256

      54cda5369660312d06d75b34cd4333457a4cc9b5239d615f45db54e2ed02f4e7

    • SHA512

      d96533a5c4053cbbf6b1b85da4fb0ad6ff851c672db8e3bb5a576201f7f51e58aa8bcbc51cb3b439634fb2d753b5986aac2f1759c990524c1c49dc3cc3d1fa84

    • SSDEEP

      98304:xB/7jU4RFtmNMFK9UFZJOFtwC3xFfBLPvsUncTCPh+RHmEPH5mf:xBc4QNIwUFZJaDhF5js4cmyfhk

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks