General

  • Target

    27a739d802e34dace763ff8ccb685b176632d9f552ae2e9fe6a900b6379269da

  • Size

    15.5MB

  • Sample

    230215-j6ez3saf3z

  • MD5

    6ea0abebd9068e9b510314cab30427b3

  • SHA1

    5a726291a97aa0f446b9fa080aea1d7d95fa91af

  • SHA256

    27a739d802e34dace763ff8ccb685b176632d9f552ae2e9fe6a900b6379269da

  • SHA512

    a611a6e6f0f8700c4434cf380028329502a3362f710158c15f6c17febbec4c371d8a4b708037de88f1767e1424d5378f969b8d997b1df7e7cd267c92f25e525b

  • SSDEEP

    393216:1weTfLRfwzXdf2F74B++cYy8pArIh8qK6OjlSMV/AWz84T:1webLR6QFklv9K6gw87A4T

Malware Config

Targets

    • Target

      27a739d802e34dace763ff8ccb685b176632d9f552ae2e9fe6a900b6379269da

    • Size

      15.5MB

    • MD5

      6ea0abebd9068e9b510314cab30427b3

    • SHA1

      5a726291a97aa0f446b9fa080aea1d7d95fa91af

    • SHA256

      27a739d802e34dace763ff8ccb685b176632d9f552ae2e9fe6a900b6379269da

    • SHA512

      a611a6e6f0f8700c4434cf380028329502a3362f710158c15f6c17febbec4c371d8a4b708037de88f1767e1424d5378f969b8d997b1df7e7cd267c92f25e525b

    • SSDEEP

      393216:1weTfLRfwzXdf2F74B++cYy8pArIh8qK6OjlSMV/AWz84T:1webLR6QFklv9K6gw87A4T

    Score
    8/10
    • Makes use of the framework's Accessibility service.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks