General

  • Target

    e3583ff0e8a20bf64a3bbf63569aa92721bc57a732ae700452d3efba51d62f07

  • Size

    8.6MB

  • Sample

    221127-rreprshd3w

  • MD5

    cf90444bce81bb3bf21423a815975888

  • SHA1

    966a7a921dfb6eae6fcc5ed08bb6b80e87908b10

  • SHA256

    e3583ff0e8a20bf64a3bbf63569aa92721bc57a732ae700452d3efba51d62f07

  • SHA512

    edd6f2285624a9bbb082f7d6f7e92279986c0c044ba7c4164b8b6571216cf3893e617ea1900d22140c21aff990d23417a40c62961cf8b8cfdcaae1327c5648ea

  • SSDEEP

    196608:skqTX3YTqADDDSd0yVuAKiSBO/ZLVdw6TTlbTgmq72Q4MtkO:skCXwqADX60yVgB+Dw4lnS5IO

Score
8/10

Malware Config

Targets

    • Target

      e3583ff0e8a20bf64a3bbf63569aa92721bc57a732ae700452d3efba51d62f07

    • Size

      8.6MB

    • MD5

      cf90444bce81bb3bf21423a815975888

    • SHA1

      966a7a921dfb6eae6fcc5ed08bb6b80e87908b10

    • SHA256

      e3583ff0e8a20bf64a3bbf63569aa92721bc57a732ae700452d3efba51d62f07

    • SHA512

      edd6f2285624a9bbb082f7d6f7e92279986c0c044ba7c4164b8b6571216cf3893e617ea1900d22140c21aff990d23417a40c62961cf8b8cfdcaae1327c5648ea

    • SSDEEP

      196608:skqTX3YTqADDDSd0yVuAKiSBO/ZLVdw6TTlbTgmq72Q4MtkO:skCXwqADX60yVgB+Dw4lnS5IO

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks