General

  • Target

    6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385

  • Size

    13.9MB

  • Sample

    231219-3vqf8ahgbp

  • MD5

    7f3656e61cd44c0f443144bee9487b39

  • SHA1

    d4b66edd007f8ab5d7c3037ef108262a7345929f

  • SHA256

    6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385

  • SHA512

    56234dbf1470bc7bc01e9fdf7438ef685509bbf354aed5ebc0b6ddb439cec73df707bd42abb285e9b96b4ee377b76d1ef9a89b435780ba2a53070bfb7eaadf1a

  • SSDEEP

    393216:PDFhK+o/rll4Xg8X0GhwZIhNigwnDujyf9Sk:PzMQXg8kGh08igUKjyfP

Score
8/10

Malware Config

Targets

    • Target

      6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385

    • Size

      13.9MB

    • MD5

      7f3656e61cd44c0f443144bee9487b39

    • SHA1

      d4b66edd007f8ab5d7c3037ef108262a7345929f

    • SHA256

      6f0a9a4341338c9c578443a88790b775c8e8211f94f1d0076f9540a2198d2385

    • SHA512

      56234dbf1470bc7bc01e9fdf7438ef685509bbf354aed5ebc0b6ddb439cec73df707bd42abb285e9b96b4ee377b76d1ef9a89b435780ba2a53070bfb7eaadf1a

    • SSDEEP

      393216:PDFhK+o/rll4Xg8X0GhwZIhNigwnDujyf9Sk:PzMQXg8kGh08igUKjyfP

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks