General

  • Target

    c4ed72bd08e0651a9f75d075ba59d0465c0e8a62315b99fa3d797df7d94b5f34

  • Size

    1.2MB

  • Sample

    221127-n3rlxsef78

  • MD5

    65be50c4deae1d09a000330961bc11e6

  • SHA1

    a3c93db191f46c9621c89edaa31823956c6b2404

  • SHA256

    c4ed72bd08e0651a9f75d075ba59d0465c0e8a62315b99fa3d797df7d94b5f34

  • SHA512

    cbe77dcd02626538a4d2fa030f6f474c05e48af94620645a1514527a05aaaeb0751b0a3dd2148aeb9c1c6b164e3894159bbae2792bb5c802383cdea4f8883e2b

  • SSDEEP

    24576:gBACmwB2WpeTXszSEHOoHIaKzxhpxzZ52HhsRwscrZN/vqV8KMBJVRYsyF:geCFB2lrsz5HOokx7mh4WnniqVYsyF

Score
8/10

Malware Config

Targets

    • Target

      c4ed72bd08e0651a9f75d075ba59d0465c0e8a62315b99fa3d797df7d94b5f34

    • Size

      1.2MB

    • MD5

      65be50c4deae1d09a000330961bc11e6

    • SHA1

      a3c93db191f46c9621c89edaa31823956c6b2404

    • SHA256

      c4ed72bd08e0651a9f75d075ba59d0465c0e8a62315b99fa3d797df7d94b5f34

    • SHA512

      cbe77dcd02626538a4d2fa030f6f474c05e48af94620645a1514527a05aaaeb0751b0a3dd2148aeb9c1c6b164e3894159bbae2792bb5c802383cdea4f8883e2b

    • SSDEEP

      24576:gBACmwB2WpeTXszSEHOoHIaKzxhpxzZ52HhsRwscrZN/vqV8KMBJVRYsyF:geCFB2lrsz5HOokx7mh4WnniqVYsyF

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks