General

  • Target

    11386bf71529443b75dcc6aea61d9405d85bc73a626e0cd6ab83eb1ec7e75ea4

  • Size

    29.5MB

  • Sample

    221126-b4pgqsfh4s

  • MD5

    54ff8673dead8c332794fc8f32a70307

  • SHA1

    6f28d54e05125624978e2b200b1dac9996d71626

  • SHA256

    11386bf71529443b75dcc6aea61d9405d85bc73a626e0cd6ab83eb1ec7e75ea4

  • SHA512

    8f2649b895b8b1fcdff07776a81eaf36961488ffc398eadbed16e2338512f28d4a1572d71a747f754fab5172d713ce9599cdae6ba255b3a7eb6490b37b826938

  • SSDEEP

    786432:ryDjh0MljpuiV4YyMu4+CsWqHoFHZez8/B:4hLjpuiVPTuDWlN0z0

Malware Config

Targets

    • Target

      11386bf71529443b75dcc6aea61d9405d85bc73a626e0cd6ab83eb1ec7e75ea4

    • Size

      29.5MB

    • MD5

      54ff8673dead8c332794fc8f32a70307

    • SHA1

      6f28d54e05125624978e2b200b1dac9996d71626

    • SHA256

      11386bf71529443b75dcc6aea61d9405d85bc73a626e0cd6ab83eb1ec7e75ea4

    • SHA512

      8f2649b895b8b1fcdff07776a81eaf36961488ffc398eadbed16e2338512f28d4a1572d71a747f754fab5172d713ce9599cdae6ba255b3a7eb6490b37b826938

    • SSDEEP

      786432:ryDjh0MljpuiV4YyMu4+CsWqHoFHZez8/B:4hLjpuiVPTuDWlN0z0

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks