General

  • Target

    eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003

  • Size

    20.5MB

  • Sample

    230202-cys4eagb7z

  • MD5

    5db9c9ef5d4d5d385a248364d867df17

  • SHA1

    12b255036ed20285c7ed04e46c1a8274ec552a96

  • SHA256

    eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003

  • SHA512

    a41379dcc0acd8d8fd8fb5eb4d15ff45c1043161dd7490466ce1d8e7597e636650b05677e0592cf7941c55dec42ba164e313d1654c7911e0b1919b4fa4c70c00

  • SSDEEP

    393216:sJGssJA35z7A79L+xaJ1mbgafiubciZTbrT9i/zVN2I+TXKtqKpPbNiRSKcsAJ1:yaJA35z7c5B/mbBffc4TBi/zVN2IkaMG

Score
8/10

Malware Config

Targets

    • Target

      eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003

    • Size

      20.5MB

    • MD5

      5db9c9ef5d4d5d385a248364d867df17

    • SHA1

      12b255036ed20285c7ed04e46c1a8274ec552a96

    • SHA256

      eb11e5ee7b81d485f871ea938d1dd7a4882feac6a53c7c69e687e732fde92003

    • SHA512

      a41379dcc0acd8d8fd8fb5eb4d15ff45c1043161dd7490466ce1d8e7597e636650b05677e0592cf7941c55dec42ba164e313d1654c7911e0b1919b4fa4c70c00

    • SSDEEP

      393216:sJGssJA35z7A79L+xaJ1mbgafiubciZTbrT9i/zVN2I+TXKtqKpPbNiRSKcsAJ1:yaJA35z7c5B/mbBffc4TBi/zVN2IkaMG

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks