General

  • Target

    cf3b8c191d379bf86975e1483921e68e88083932

  • Size

    468KB

  • Sample

    230202-qz6b1scd6z

  • MD5

    cbbd3c3868a0f8712631c9798fa20ca4

  • SHA1

    cf3b8c191d379bf86975e1483921e68e88083932

  • SHA256

    b1d12fced390bc764261e0f2e3064bd8ff9289f3ade17b47f0f8cbb9795c9413

  • SHA512

    5d80c206192a6ac30561b9835897d516167d62e597e9feb9d78ad6fa857d1707925fe468874f8a143a890f084a2e34098e02190ba79c5cbb6597c12df07c4797

  • SSDEEP

    12288:nfHPsb/emfUvNW9UJwhGZIou3orb87W9t2SmX5HbK:fvG/emfUFWPeISbO42SmX5u

Malware Config

Targets

    • Target

      cf3b8c191d379bf86975e1483921e68e88083932

    • Size

      468KB

    • MD5

      cbbd3c3868a0f8712631c9798fa20ca4

    • SHA1

      cf3b8c191d379bf86975e1483921e68e88083932

    • SHA256

      b1d12fced390bc764261e0f2e3064bd8ff9289f3ade17b47f0f8cbb9795c9413

    • SHA512

      5d80c206192a6ac30561b9835897d516167d62e597e9feb9d78ad6fa857d1707925fe468874f8a143a890f084a2e34098e02190ba79c5cbb6597c12df07c4797

    • SSDEEP

      12288:nfHPsb/emfUvNW9UJwhGZIou3orb87W9t2SmX5HbK:fvG/emfUFWPeISbO42SmX5u

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks