General

  • Target

    5403a2b79de2c2d8253e84b1c884330c7c4f15c24e670dbd2f6abcdef537ce78

  • Size

    965KB

  • Sample

    221126-bjzf7see9x

  • MD5

    70b69fb0c86070fe1d4387477fd92993

  • SHA1

    d29476f8bf52cdc36c743ec7ae2e8f820b967f5f

  • SHA256

    5403a2b79de2c2d8253e84b1c884330c7c4f15c24e670dbd2f6abcdef537ce78

  • SHA512

    c0dd6ebfab541368ed36bffe468f94763e0a745157ace3eb9243a6ddd3a8c5e159b2659241f377fdd904e657adcbab227c917c8694ec7b286903835407c5d689

  • SSDEEP

    24576:SEpUbvOsy4eo97PgWM7xxGIqZKXPU4dLL86TXMtjh5ApNQF:SLbOsySh79j41DDMtjh50a

Score
8/10

Malware Config

Targets

    • Target

      5403a2b79de2c2d8253e84b1c884330c7c4f15c24e670dbd2f6abcdef537ce78

    • Size

      965KB

    • MD5

      70b69fb0c86070fe1d4387477fd92993

    • SHA1

      d29476f8bf52cdc36c743ec7ae2e8f820b967f5f

    • SHA256

      5403a2b79de2c2d8253e84b1c884330c7c4f15c24e670dbd2f6abcdef537ce78

    • SHA512

      c0dd6ebfab541368ed36bffe468f94763e0a745157ace3eb9243a6ddd3a8c5e159b2659241f377fdd904e657adcbab227c917c8694ec7b286903835407c5d689

    • SSDEEP

      24576:SEpUbvOsy4eo97PgWM7xxGIqZKXPU4dLL86TXMtjh5ApNQF:SLbOsySh79j41DDMtjh50a

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks