General

  • Target

    6f9b7af3cbdcd1411df563f3dadafe48e0513e34a5d5598b3a197ccb6b3a51f7

  • Size

    26.4MB

  • Sample

    231219-3x5c6aaaal

  • MD5

    1f28db60f77558863cac4293c2b4be98

  • SHA1

    f30b725b1430c9f4009d5e0cff609df60bcab2bc

  • SHA256

    6f9b7af3cbdcd1411df563f3dadafe48e0513e34a5d5598b3a197ccb6b3a51f7

  • SHA512

    77e9ac16b990127e49bed000784a8cdc9141bc376de02ea8cfc6db1b8da14eab204ca034a5283dccc7a7b12774c6640e191d443749a402a410a8ff22b48d4b54

  • SSDEEP

    786432:q5rUC3UlEY47/S/p9X/X/c4KyfwImbIcRt0Ica9kssQvTh:q+9EYY49n5fwImwIXvN

Score
8/10

Malware Config

Targets

    • Target

      6f9b7af3cbdcd1411df563f3dadafe48e0513e34a5d5598b3a197ccb6b3a51f7

    • Size

      26.4MB

    • MD5

      1f28db60f77558863cac4293c2b4be98

    • SHA1

      f30b725b1430c9f4009d5e0cff609df60bcab2bc

    • SHA256

      6f9b7af3cbdcd1411df563f3dadafe48e0513e34a5d5598b3a197ccb6b3a51f7

    • SHA512

      77e9ac16b990127e49bed000784a8cdc9141bc376de02ea8cfc6db1b8da14eab204ca034a5283dccc7a7b12774c6640e191d443749a402a410a8ff22b48d4b54

    • SSDEEP

      786432:q5rUC3UlEY47/S/p9X/X/c4KyfwImbIcRt0Ica9kssQvTh:q+9EYY49n5fwImwIXvN

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks