General

  • Target

    cbf351b2320deeb87bbd7d9b0bc3871c492cd6c6fbcf399e18e142fedc2d49f6

  • Size

    4.0MB

  • Sample

    221125-xjdqdsga54

  • MD5

    aa6016382f8ed95dc898599618033034

  • SHA1

    30866a75ed6021666662767323b3284ff8f59072

  • SHA256

    cbf351b2320deeb87bbd7d9b0bc3871c492cd6c6fbcf399e18e142fedc2d49f6

  • SHA512

    de8c18d2413ce149f617ca2c98d24554dfb4dc43673dfcda976408cca48350666f24bfae35c3c89a86c5d5c74d52196f3c928a3c85de52bce0b3329cce74e3ad

  • SSDEEP

    98304:KJCm9/gRC3AjN2/s0gaBR4KjSUrKL8SUwNnjncLLeddhH53ls0:KJCm9/gRAGc/s0TgoSUrLwFjKLiXZ3lt

Score
8/10

Malware Config

Targets

    • Target

      cbf351b2320deeb87bbd7d9b0bc3871c492cd6c6fbcf399e18e142fedc2d49f6

    • Size

      4.0MB

    • MD5

      aa6016382f8ed95dc898599618033034

    • SHA1

      30866a75ed6021666662767323b3284ff8f59072

    • SHA256

      cbf351b2320deeb87bbd7d9b0bc3871c492cd6c6fbcf399e18e142fedc2d49f6

    • SHA512

      de8c18d2413ce149f617ca2c98d24554dfb4dc43673dfcda976408cca48350666f24bfae35c3c89a86c5d5c74d52196f3c928a3c85de52bce0b3329cce74e3ad

    • SSDEEP

      98304:KJCm9/gRC3AjN2/s0gaBR4KjSUrKL8SUwNnjncLLeddhH53ls0:KJCm9/gRAGc/s0TgoSUrLwFjKLiXZ3lt

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks