General

  • Target

    0fa2123c662af5f3da5b2a3a11f47ae5

  • Size

    13.5MB

  • Sample

    231219-m56cesbae7

  • MD5

    0fa2123c662af5f3da5b2a3a11f47ae5

  • SHA1

    60ecd865c5e5d9bc9bab6d0515878cf793e83f1c

  • SHA256

    8a6486c5895eda9a75f3bb09eeeb1d0d46b25939bb191b3be8d9d319e2e57efa

  • SHA512

    bfe7b2a4ddf69e296a4df7ed14498b21a16a1bca5b48c8c9ad38c556ede184f9cfb87725166bdc3e57d5a66dd13817910a193e0d2e8dffd60338010527ce6433

  • SSDEEP

    393216:iXgo7SmuC8+q/ZM9MVCcEy3iX3suhj7BM:kuC8D/ZtgcEy3iX3sWK

Score
8/10

Malware Config

Targets

    • Target

      0fa2123c662af5f3da5b2a3a11f47ae5

    • Size

      13.5MB

    • MD5

      0fa2123c662af5f3da5b2a3a11f47ae5

    • SHA1

      60ecd865c5e5d9bc9bab6d0515878cf793e83f1c

    • SHA256

      8a6486c5895eda9a75f3bb09eeeb1d0d46b25939bb191b3be8d9d319e2e57efa

    • SHA512

      bfe7b2a4ddf69e296a4df7ed14498b21a16a1bca5b48c8c9ad38c556ede184f9cfb87725166bdc3e57d5a66dd13817910a193e0d2e8dffd60338010527ce6433

    • SSDEEP

      393216:iXgo7SmuC8+q/ZM9MVCcEy3iX3suhj7BM:kuC8D/ZtgcEy3iX3sWK

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks