General

  • Target

    dd9ff075e080ce14259671bd1a9361f052e446f1eba8353c3daed8c0180829b1

  • Size

    4.2MB

  • Sample

    221127-bccnvsce6t

  • MD5

    b0687f0f25ccf2b8389a404005cf0c2e

  • SHA1

    92b1f19255dce213c21e9031bc564fc0a2839000

  • SHA256

    dd9ff075e080ce14259671bd1a9361f052e446f1eba8353c3daed8c0180829b1

  • SHA512

    8817e7c097db6fc236f3fadb9b95ce8044ce17d0263f20148282983ddb5d5bbdcf7e282d188f297456fa05d7765b7eff9674d8b7f86a9d669ed8e3dee999186e

  • SSDEEP

    98304:X+Ua2QMMgnTPnMZDM70RMh71fKfZ3IWQoDypNKuIvTVrg:xQMdn7nMlKh7q3IZoOM9K

Score
8/10

Malware Config

Targets

    • Target

      dd9ff075e080ce14259671bd1a9361f052e446f1eba8353c3daed8c0180829b1

    • Size

      4.2MB

    • MD5

      b0687f0f25ccf2b8389a404005cf0c2e

    • SHA1

      92b1f19255dce213c21e9031bc564fc0a2839000

    • SHA256

      dd9ff075e080ce14259671bd1a9361f052e446f1eba8353c3daed8c0180829b1

    • SHA512

      8817e7c097db6fc236f3fadb9b95ce8044ce17d0263f20148282983ddb5d5bbdcf7e282d188f297456fa05d7765b7eff9674d8b7f86a9d669ed8e3dee999186e

    • SSDEEP

      98304:X+Ua2QMMgnTPnMZDM70RMh71fKfZ3IWQoDypNKuIvTVrg:xQMdn7nMlKh7q3IZoOM9K

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks