General

  • Target

    2a61e4bc5c7d24fdc6897473a98f0c42

  • Size

    18.5MB

  • Sample

    231219-p57xcsgfbr

  • MD5

    2a61e4bc5c7d24fdc6897473a98f0c42

  • SHA1

    d4f9f046910c85d04e4c50bf43116cd06c800964

  • SHA256

    54bbbc9f49b32f57487ba8622677e2eead7920e38050cd1cb2543fc15fcc3732

  • SHA512

    f937d995b17b97f705014cf7e69eea08b1a13d7ad6f2975a9531f35ad6b19bede724c34efca9a39e7e3c5a70e0b7e0b3c49b098e5c62a4bf7d20a7fed13fc691

  • SSDEEP

    393216:RLR5c9mUuSyklwQ7ZMzzfyS9rw2oY+/okUjg9Ax:i7yCw2AzfySRjoY+/opg0

Score
8/10

Malware Config

Targets

    • Target

      2a61e4bc5c7d24fdc6897473a98f0c42

    • Size

      18.5MB

    • MD5

      2a61e4bc5c7d24fdc6897473a98f0c42

    • SHA1

      d4f9f046910c85d04e4c50bf43116cd06c800964

    • SHA256

      54bbbc9f49b32f57487ba8622677e2eead7920e38050cd1cb2543fc15fcc3732

    • SHA512

      f937d995b17b97f705014cf7e69eea08b1a13d7ad6f2975a9531f35ad6b19bede724c34efca9a39e7e3c5a70e0b7e0b3c49b098e5c62a4bf7d20a7fed13fc691

    • SSDEEP

      393216:RLR5c9mUuSyklwQ7ZMzzfyS9rw2oY+/okUjg9Ax:i7yCw2AzfySRjoY+/opg0

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks