General

  • Target

    3a4fb283eaae60ad37c6d6bbcb78a357868d9a59c251ecda20e8e693ac1291e7

  • Size

    1.5MB

  • Sample

    221127-tqxv3aba52

  • MD5

    14aada83df31f01c17fc57c153df2adb

  • SHA1

    f878bd665fe580f61f673322fa78a7b5eb507f4c

  • SHA256

    3a4fb283eaae60ad37c6d6bbcb78a357868d9a59c251ecda20e8e693ac1291e7

  • SHA512

    2cb39ab36d52e9637a3223d4e6ed3830a59391fa66a99eb1e2dd9a6f21ede8c10e9b5f80563536acd106f9b3be0cfa463133aa06d383d279f8890a0a163d1d2a

  • SSDEEP

    24576:y8JyY06ECJwYOSOt3CfnCvzWqQgNnanYUyMNkLGx/BU5ybLzMHHdl8HTBNwwDQME:yHiwYOSOgnCvzGgAYUy6kLGx/BU56Lzu

Score
8/10

Malware Config

Targets

    • Target

      3a4fb283eaae60ad37c6d6bbcb78a357868d9a59c251ecda20e8e693ac1291e7

    • Size

      1.5MB

    • MD5

      14aada83df31f01c17fc57c153df2adb

    • SHA1

      f878bd665fe580f61f673322fa78a7b5eb507f4c

    • SHA256

      3a4fb283eaae60ad37c6d6bbcb78a357868d9a59c251ecda20e8e693ac1291e7

    • SHA512

      2cb39ab36d52e9637a3223d4e6ed3830a59391fa66a99eb1e2dd9a6f21ede8c10e9b5f80563536acd106f9b3be0cfa463133aa06d383d279f8890a0a163d1d2a

    • SSDEEP

      24576:y8JyY06ECJwYOSOt3CfnCvzWqQgNnanYUyMNkLGx/BU5ybLzMHHdl8HTBNwwDQME:yHiwYOSOgnCvzGgAYUy6kLGx/BU56Lzu

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks