General

  • Target

    be99390edc256f786becb9ca9b0fb5210e18e5d638dfb11b4632012cb6d6c647

  • Size

    4.7MB

  • Sample

    221128-bvlz9ahh8v

  • MD5

    8358de51bf92e74d2e83021021b90d30

  • SHA1

    1ff12b20b1404df4b913b18add374fdcbe269adc

  • SHA256

    be99390edc256f786becb9ca9b0fb5210e18e5d638dfb11b4632012cb6d6c647

  • SHA512

    5c13ed75509dfe0ce267aff23a091e595ad40323ba10a2ab1a3b80c467b383a19b444b878a0db9e5cb5c1cc14e08d98dde3f10fd91c0020d8bbd8ba45c544569

  • SSDEEP

    98304:T6n5VlgBEmN1JLdEPjZ8jnduyYZIuL+DsvKbs8f5D4BylUBbk:65VlIzw24Zmxs8R82

Score
8/10

Malware Config

Targets

    • Target

      be99390edc256f786becb9ca9b0fb5210e18e5d638dfb11b4632012cb6d6c647

    • Size

      4.7MB

    • MD5

      8358de51bf92e74d2e83021021b90d30

    • SHA1

      1ff12b20b1404df4b913b18add374fdcbe269adc

    • SHA256

      be99390edc256f786becb9ca9b0fb5210e18e5d638dfb11b4632012cb6d6c647

    • SHA512

      5c13ed75509dfe0ce267aff23a091e595ad40323ba10a2ab1a3b80c467b383a19b444b878a0db9e5cb5c1cc14e08d98dde3f10fd91c0020d8bbd8ba45c544569

    • SSDEEP

      98304:T6n5VlgBEmN1JLdEPjZ8jnduyYZIuL+DsvKbs8f5D4BylUBbk:65VlIzw24Zmxs8R82

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks