General

  • Target

    1d6dbed85f90e44a19ca90ff8691c8775f0c0fa31aacdaf6823ee087a89d877f

  • Size

    510KB

  • Sample

    221128-bwfvmadg28

  • MD5

    dc046192581af2848b8d233ceb93f450

  • SHA1

    12a51a2daf21deb0306b1ac30db29e51aadceefa

  • SHA256

    1d6dbed85f90e44a19ca90ff8691c8775f0c0fa31aacdaf6823ee087a89d877f

  • SHA512

    ab4081ebe1dc51fbdf05807c601c86dcf09e06f4c5805311285b0d8a9780803ca29668da997cc8aaa3ae542fa8cf5bcc4623d128a6e1560ef85da46f7d48e04c

  • SSDEEP

    12288:4OzuGu+nqpky+2Tch62plXwz2EINPISXgvAsAmb:I3+qpFNch3Xwz238AsAmb

Malware Config

Targets

    • Target

      1d6dbed85f90e44a19ca90ff8691c8775f0c0fa31aacdaf6823ee087a89d877f

    • Size

      510KB

    • MD5

      dc046192581af2848b8d233ceb93f450

    • SHA1

      12a51a2daf21deb0306b1ac30db29e51aadceefa

    • SHA256

      1d6dbed85f90e44a19ca90ff8691c8775f0c0fa31aacdaf6823ee087a89d877f

    • SHA512

      ab4081ebe1dc51fbdf05807c601c86dcf09e06f4c5805311285b0d8a9780803ca29668da997cc8aaa3ae542fa8cf5bcc4623d128a6e1560ef85da46f7d48e04c

    • SSDEEP

      12288:4OzuGu+nqpky+2Tch62plXwz2EINPISXgvAsAmb:I3+qpFNch3Xwz238AsAmb

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads the content of SMS inbox messages.

    • Reads information about phone network operator.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks