General

  • Target

    3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417

  • Size

    30.1MB

  • Sample

    221126-g414esgh75

  • MD5

    7be9ba64e1dc67fccf6ef31bf7bfe8c8

  • SHA1

    fd16b26a36db85a5049d96dd8b8ee1bca93977ed

  • SHA256

    3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417

  • SHA512

    4f7a7a8eac93e2ad5e4b4dd37609ac98761fcf00ae2e416d174e0a71b8ae14c71ef568b319dc9d0024faf2d4da1159f50513dd834f67c95f70d1f54d0bd8b2b4

  • SSDEEP

    786432:s1eQ1vUxSpes0EvM4kKyT/WqEG4scs03ykjW/TFFDb1+Uc:s1HF06M4kj/tEzikaTF9boL

Malware Config

Targets

    • Target

      3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417

    • Size

      30.1MB

    • MD5

      7be9ba64e1dc67fccf6ef31bf7bfe8c8

    • SHA1

      fd16b26a36db85a5049d96dd8b8ee1bca93977ed

    • SHA256

      3baef61646f44b392d6036650ff73f6db1116117b0ca613f1714fbe28a74b417

    • SHA512

      4f7a7a8eac93e2ad5e4b4dd37609ac98761fcf00ae2e416d174e0a71b8ae14c71ef568b319dc9d0024faf2d4da1159f50513dd834f67c95f70d1f54d0bd8b2b4

    • SSDEEP

      786432:s1eQ1vUxSpes0EvM4kKyT/WqEG4scs03ykjW/TFFDb1+Uc:s1HF06M4kj/tEzikaTF9boL

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks