General

  • Target

    a3571b97204f78463191f8c71694e63fcef6fcf2833d022a33067274bbf033c3

  • Size

    3.0MB

  • Sample

    221126-bjvs1sbe37

  • MD5

    7b610e9eda1b25f2e84d85777285cc5d

  • SHA1

    45b0083a030f22fec40ccebfca3b15ba5440b0a9

  • SHA256

    a3571b97204f78463191f8c71694e63fcef6fcf2833d022a33067274bbf033c3

  • SHA512

    69928e15db5a558f0fa4b6e48696eb65455ee9a9b1960b31c335154a81dfa1b0a651390d0de064299748359cefc3bf6a7ae21cee66cdd20e750fd852b7f36ee8

  • SSDEEP

    49152:dVw4oKNRI/iwHku27d7/UV+lKtzvOAkYWTVzkC0Wxzq4kVHkDqN2JtT:dVw8i5HnuBMIKNRahTtIT4qq

Malware Config

Targets

    • Target

      a3571b97204f78463191f8c71694e63fcef6fcf2833d022a33067274bbf033c3

    • Size

      3.0MB

    • MD5

      7b610e9eda1b25f2e84d85777285cc5d

    • SHA1

      45b0083a030f22fec40ccebfca3b15ba5440b0a9

    • SHA256

      a3571b97204f78463191f8c71694e63fcef6fcf2833d022a33067274bbf033c3

    • SHA512

      69928e15db5a558f0fa4b6e48696eb65455ee9a9b1960b31c335154a81dfa1b0a651390d0de064299748359cefc3bf6a7ae21cee66cdd20e750fd852b7f36ee8

    • SSDEEP

      49152:dVw4oKNRI/iwHku27d7/UV+lKtzvOAkYWTVzkC0Wxzq4kVHkDqN2JtT:dVw8i5HnuBMIKNRahTtIT4qq

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks