General

  • Target

    7704259605a615167de264b9e6664db098c098b2d4d69caeda53cc1c635e8468

  • Size

    1.7MB

  • Sample

    221126-xn2b9aba8s

  • MD5

    640960039dc458b222603a8a0b8d01ee

  • SHA1

    ca4a4f3e16e0886f84e30d1037dd8a666bd52fd5

  • SHA256

    7704259605a615167de264b9e6664db098c098b2d4d69caeda53cc1c635e8468

  • SHA512

    721ca0c35760a48dd2f72ab9c448e1392d69fbdcfb8b1024e4ec8091e156ff34a385ed79e911471a38ef38cbed7d15b088eeedd669414dec15bb71ce38d0e0d3

  • SSDEEP

    24576:e0MDR0MdF1QYBWdE+iTr3194cLEjzPRVKUZC5ZvCdfVTX0p0uobZZz+FE01NoSJJ:W0MdVJgCmzPtCzadfVDJuobZZS7oS1

Malware Config

Targets

    • Target

      7704259605a615167de264b9e6664db098c098b2d4d69caeda53cc1c635e8468

    • Size

      1.7MB

    • MD5

      640960039dc458b222603a8a0b8d01ee

    • SHA1

      ca4a4f3e16e0886f84e30d1037dd8a666bd52fd5

    • SHA256

      7704259605a615167de264b9e6664db098c098b2d4d69caeda53cc1c635e8468

    • SHA512

      721ca0c35760a48dd2f72ab9c448e1392d69fbdcfb8b1024e4ec8091e156ff34a385ed79e911471a38ef38cbed7d15b088eeedd669414dec15bb71ce38d0e0d3

    • SSDEEP

      24576:e0MDR0MdF1QYBWdE+iTr3194cLEjzPRVKUZC5ZvCdfVTX0p0uobZZz+FE01NoSJJ:W0MdVJgCmzPtCzadfVDJuobZZS7oS1

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks