General

  • Target

    6d9b63f3df43164faccf3be53730253d4f5f3d9ebebbc70483ce037f7731ae59

  • Size

    989KB

  • Sample

    231219-3mt5fabhf2

  • MD5

    ae1c47a260eaa74b9d4d7117ce67499d

  • SHA1

    2ce606a7998a931257102719b111fa193e1f8d08

  • SHA256

    6d9b63f3df43164faccf3be53730253d4f5f3d9ebebbc70483ce037f7731ae59

  • SHA512

    f998f0ec63ac7001a249f7ddf6a829277e1cd565d5e211f15ba60e589d4acd20c035fe4be8e6d8b134688c026a58f773624561e87c5927d26b6365f998d2eb32

  • SSDEEP

    24576:FsBc0rZkwdxnIvo7bYIaalsd/wDgjfGXdUqBYEr:FsBcq9AA7Lliw8zPqt

Score
10/10

Malware Config

Targets

    • Target

      6d9b63f3df43164faccf3be53730253d4f5f3d9ebebbc70483ce037f7731ae59

    • Size

      989KB

    • MD5

      ae1c47a260eaa74b9d4d7117ce67499d

    • SHA1

      2ce606a7998a931257102719b111fa193e1f8d08

    • SHA256

      6d9b63f3df43164faccf3be53730253d4f5f3d9ebebbc70483ce037f7731ae59

    • SHA512

      f998f0ec63ac7001a249f7ddf6a829277e1cd565d5e211f15ba60e589d4acd20c035fe4be8e6d8b134688c026a58f773624561e87c5927d26b6365f998d2eb32

    • SSDEEP

      24576:FsBc0rZkwdxnIvo7bYIaalsd/wDgjfGXdUqBYEr:FsBcq9AA7Lliw8zPqt

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks