General

  • Target

    794a2ebea5acc78587a2c0e4353a88bb86e6a6795123bc0896b682dc60f8c60b

  • Size

    3.0MB

  • Sample

    221128-k232sabf54

  • MD5

    5d05e86ce0f7f1ac9563afa87efeb60a

  • SHA1

    e1ad847011d3cc4a82c0484d8d96f242ed7316ac

  • SHA256

    794a2ebea5acc78587a2c0e4353a88bb86e6a6795123bc0896b682dc60f8c60b

  • SHA512

    c1db3c259c5a285b47865a074687ea47369af516ae1f5b0ecacc44c62f0cd392ee944488414c4016612f97997972875456543a7ee53ac72aed1037931f7a9761

  • SSDEEP

    49152:ZhZsvbv58RMRsK0yDUyDLu9rk2lDYL/PBzzgzFwZkenmnzkfYisozus9x:JksyDXWk0Y9z0zWZkxnzkfYijx

Score
8/10

Malware Config

Targets

    • Target

      794a2ebea5acc78587a2c0e4353a88bb86e6a6795123bc0896b682dc60f8c60b

    • Size

      3.0MB

    • MD5

      5d05e86ce0f7f1ac9563afa87efeb60a

    • SHA1

      e1ad847011d3cc4a82c0484d8d96f242ed7316ac

    • SHA256

      794a2ebea5acc78587a2c0e4353a88bb86e6a6795123bc0896b682dc60f8c60b

    • SHA512

      c1db3c259c5a285b47865a074687ea47369af516ae1f5b0ecacc44c62f0cd392ee944488414c4016612f97997972875456543a7ee53ac72aed1037931f7a9761

    • SSDEEP

      49152:ZhZsvbv58RMRsK0yDUyDLu9rk2lDYL/PBzzgzFwZkenmnzkfYisozus9x:JksyDXWk0Y9z0zWZkxnzkfYijx

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads the content of SMS inbox messages.

MITRE ATT&CK Matrix

Tasks