General

  • Target

    56a74ec9f5252ca74fcbfd1229f56726916e3625e0bcc9fb10bd209ecae46867

  • Size

    2.9MB

  • Sample

    221126-bjw13see81

  • MD5

    a01ab470f8981e19328babc0c254a0bd

  • SHA1

    b4357b161eea4a26e417b69c2f5e40279ca4ee17

  • SHA256

    56a74ec9f5252ca74fcbfd1229f56726916e3625e0bcc9fb10bd209ecae46867

  • SHA512

    58903c6be1edb4e6d600a3a9d47f3ab7f9b86e73e328c507b32ac60be538fa90b209ba77be9f7fd2b224ff958d2c451430dcd088f470d87408216f0a15fb2a76

  • SSDEEP

    49152:+Sw4ohPpI/iwHku27d7/UV+lKtzvOAkYWTVY5WH1XITHL7i3rYGsB:+SwNa5HnuBMIKNtahVV23i3rYDB

Malware Config

Targets

    • Target

      56a74ec9f5252ca74fcbfd1229f56726916e3625e0bcc9fb10bd209ecae46867

    • Size

      2.9MB

    • MD5

      a01ab470f8981e19328babc0c254a0bd

    • SHA1

      b4357b161eea4a26e417b69c2f5e40279ca4ee17

    • SHA256

      56a74ec9f5252ca74fcbfd1229f56726916e3625e0bcc9fb10bd209ecae46867

    • SHA512

      58903c6be1edb4e6d600a3a9d47f3ab7f9b86e73e328c507b32ac60be538fa90b209ba77be9f7fd2b224ff958d2c451430dcd088f470d87408216f0a15fb2a76

    • SSDEEP

      49152:+Sw4ohPpI/iwHku27d7/UV+lKtzvOAkYWTVY5WH1XITHL7i3rYGsB:+SwNa5HnuBMIKNtahVV23i3rYDB

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks