General

  • Target

    0fbbf5bca438574f5592ac1f548d5d460ddccb4ad6225087a770b47fb717c427 (1).zip

  • Size

    4MB

  • Sample

    230328-cbvzgsgd46

  • MD5

    f17a0df6c9ca13c8a1082b2db2a754b6

  • SHA1

    31d534299175cc7c98dea76a14c441a4bcad0209

  • SHA256

    c5a6811eb32bcfdaf8043a253f1eb8c544d46f602042fe351c501194d4f91b80

  • SHA512

    2139445ad5a017b7ee00a80118eaed2f1f60b1a534e09fade8d547b827aff7f4e2d0da92f94aa5cd150008f62d8cfaf56ef07d558cc1b657c6ed914cabbeb3a6

  • SSDEEP

    98304:eVL/HjuemyTMdsjMWGbuHfR3sicXOPLkeSgUysK8lT/XsIMkk0uDT:cvj1myT6Uma6TXOjSJz5/okE

Malware Config

Targets

    • Target

      0fbbf5bca438574f5592ac1f548d5d460ddccb4ad6225087a770b47fb717c427

    • Size

      5MB

    • MD5

      ac71c730698b63a8fa3bcf2ba00ba35b

    • SHA1

      90351140fa08992ac29f80a9a4466e05228a3e5d

    • SHA256

      0fbbf5bca438574f5592ac1f548d5d460ddccb4ad6225087a770b47fb717c427

    • SHA512

      a28b4e01fc0f78bdd101fafae29851ad4b916f449144ecddba35f269c8d397d3cc8ca60caea3d8db982897bdf100836021de1706d18f21cd86fb34ad4444cc88

    • SSDEEP

      98304:zNdSPANRI/eYFzsyRy9XDG992B0oOvdAEpAmdy5FoQ/1NL9NlZa/I4MbcBMRpw7:m4ResyUdGb2BcVAGrdIFoQ/1NdZwfZ

    Score
    7/10
    • Acquires the wake lock.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks