General

  • Target

    3d222f237097a02bc8d3d012a917cefabac89e34da12e0139edd7903baccdb04

  • Size

    2.2MB

  • Sample

    230816-rxfh9adc4z

  • MD5

    56292fee378ec3147e4e005559c67b79

  • SHA1

    f3cf3bddb4e414ea38df1aff96f7a32b0eb5ab0e

  • SHA256

    3d222f237097a02bc8d3d012a917cefabac89e34da12e0139edd7903baccdb04

  • SHA512

    bdbb177fefaf2252e7d46b7d280f21c6425b06504835c1745fceb68091a45ef234f5e0d6264ff2e13c3f65cd68c1ed3df54c4060583deb0f0c4dc5d82a60391e

  • SSDEEP

    49152:dOn8XtHAMveSI4HvpAqAco5vJaJ0aIbsQ2APvq0/23RjmLgp0h:U8dHAMXx+5sqJsQz9/4mR

Malware Config

Targets

    • Target

      3d222f237097a02bc8d3d012a917cefabac89e34da12e0139edd7903baccdb04

    • Size

      2.2MB

    • MD5

      56292fee378ec3147e4e005559c67b79

    • SHA1

      f3cf3bddb4e414ea38df1aff96f7a32b0eb5ab0e

    • SHA256

      3d222f237097a02bc8d3d012a917cefabac89e34da12e0139edd7903baccdb04

    • SHA512

      bdbb177fefaf2252e7d46b7d280f21c6425b06504835c1745fceb68091a45ef234f5e0d6264ff2e13c3f65cd68c1ed3df54c4060583deb0f0c4dc5d82a60391e

    • SSDEEP

      49152:dOn8XtHAMveSI4HvpAqAco5vJaJ0aIbsQ2APvq0/23RjmLgp0h:U8dHAMXx+5sqJsQz9/4mR

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

    • Target

      ju.dll

    • Size

      894KB

    • MD5

      223e639aa7bf76b25e72f8ad6d271af3

    • SHA1

      24671d54300006c310ae23d1f2401515f5f59801

    • SHA256

      2efa5f87d4dfcc5bf511048b6b2a3bf5b9a286bf482aa7eb3556017923857950

    • SHA512

      e8aa2552926b1971aa70d8f7eee987237854435bfc797ee50584cbc98832ffff89cdbb320a6ff82e4b66fd0c7baaef93db6baaa317f0b84cf7d06525fba2b0e4

    • SSDEEP

      24576:OuN2b41ktccIwyXJOhp/bJ5feS1SnV4o2SapA+w:H8XtHAMveSI4HvpAh

    Score
    1/10

MITRE ATT&CK Matrix

Tasks