General

  • Target

    d5c7b78454a095af318624b160887e2d564b228425ee8f54972ab6352fc36241

  • Size

    4.7MB

  • Sample

    221127-lpnl1abh2w

  • MD5

    25145216945da24399dab7dd60127857

  • SHA1

    477c17a53b4ed7cb0dd830aab3ab1a595e99d273

  • SHA256

    d5c7b78454a095af318624b160887e2d564b228425ee8f54972ab6352fc36241

  • SHA512

    a16da55644824590db59ca6e55c39bc2d9f1311718fbb3527f1a272172612365436d01a676c1ab3e5902ddc21d5a26045db43194780bd2eeff689332ae1df56d

  • SSDEEP

    98304:owX61AxBEm3ocFTdac+83HduyYZIuL+DsvKbs8f5D4BejUJVT:Z61Aj4014Zmxs8R81

Score
8/10

Malware Config

Targets

    • Target

      d5c7b78454a095af318624b160887e2d564b228425ee8f54972ab6352fc36241

    • Size

      4.7MB

    • MD5

      25145216945da24399dab7dd60127857

    • SHA1

      477c17a53b4ed7cb0dd830aab3ab1a595e99d273

    • SHA256

      d5c7b78454a095af318624b160887e2d564b228425ee8f54972ab6352fc36241

    • SHA512

      a16da55644824590db59ca6e55c39bc2d9f1311718fbb3527f1a272172612365436d01a676c1ab3e5902ddc21d5a26045db43194780bd2eeff689332ae1df56d

    • SSDEEP

      98304:owX61AxBEm3ocFTdac+83HduyYZIuL+DsvKbs8f5D4BejUJVT:Z61Aj4014Zmxs8R81

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks