General

  • Target

    eb5a548c1d7565cf7ac3c3363edf9d2b13be83865c5f40aeef23097f34bb3cb5

  • Size

    4.7MB

  • Sample

    221127-1r9dtafd9y

  • MD5

    d4a845ea47b3bf8893f964cc883eae41

  • SHA1

    4a2527c77451ce9db795f0354543a6c7b3953362

  • SHA256

    eb5a548c1d7565cf7ac3c3363edf9d2b13be83865c5f40aeef23097f34bb3cb5

  • SHA512

    8a562c785bd3d658f4ee390fab2f5fd7199eed54b52a328ea47a471fb2927786d2172820713d9e0641dc55e85fbc255f1be9cbe8580330fb0155a1749765bf3b

  • SSDEEP

    98304:oc7C1cRBEm/gc9v1m468bWduyYZIuL+DsvKbs8f5D4Bm6Y5gx:NC1cDogs4Zmxs8R8x

Score
8/10

Malware Config

Targets

    • Target

      eb5a548c1d7565cf7ac3c3363edf9d2b13be83865c5f40aeef23097f34bb3cb5

    • Size

      4.7MB

    • MD5

      d4a845ea47b3bf8893f964cc883eae41

    • SHA1

      4a2527c77451ce9db795f0354543a6c7b3953362

    • SHA256

      eb5a548c1d7565cf7ac3c3363edf9d2b13be83865c5f40aeef23097f34bb3cb5

    • SHA512

      8a562c785bd3d658f4ee390fab2f5fd7199eed54b52a328ea47a471fb2927786d2172820713d9e0641dc55e85fbc255f1be9cbe8580330fb0155a1749765bf3b

    • SSDEEP

      98304:oc7C1cRBEm/gc9v1m468bWduyYZIuL+DsvKbs8f5D4Bm6Y5gx:NC1cDogs4Zmxs8R8x

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks