General

  • Target

    2683f1ac81dd7c1a45dc681a18b806e215c004ca37389d50805472568675ab74

  • Size

    30.6MB

  • Sample

    221126-xhqzbsfe58

  • MD5

    d501138bf649daced720966ba22daf4f

  • SHA1

    c007bdcb11aac5bed8fcfa9b75cd7e96c5092689

  • SHA256

    2683f1ac81dd7c1a45dc681a18b806e215c004ca37389d50805472568675ab74

  • SHA512

    0016cd5d1ccf95f2ff9c37928d0d05f5bc4e3c6a3a756a9b43af5e085c643a9ff1c6c32050d2d5fefcc4acf458317b81120e0a126a0e33af26d788ea14a777b6

  • SSDEEP

    786432:VKhpVcKu7I0JAj3LXElRTWlFNyLsqi4mEY1vxVvOo23:whjcKu7IZ34lh2NmePxVvO53

Malware Config

Targets

    • Target

      2683f1ac81dd7c1a45dc681a18b806e215c004ca37389d50805472568675ab74

    • Size

      30.6MB

    • MD5

      d501138bf649daced720966ba22daf4f

    • SHA1

      c007bdcb11aac5bed8fcfa9b75cd7e96c5092689

    • SHA256

      2683f1ac81dd7c1a45dc681a18b806e215c004ca37389d50805472568675ab74

    • SHA512

      0016cd5d1ccf95f2ff9c37928d0d05f5bc4e3c6a3a756a9b43af5e085c643a9ff1c6c32050d2d5fefcc4acf458317b81120e0a126a0e33af26d788ea14a777b6

    • SSDEEP

      786432:VKhpVcKu7I0JAj3LXElRTWlFNyLsqi4mEY1vxVvOo23:whjcKu7IZ34lh2NmePxVvO53

    Score
    7/10
    • Acquires the wake lock.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks