General

  • Target

    58b23e37d2c21f9c5bb879563d42a846

  • Size

    30.6MB

  • Sample

    231219-tkzsgadfg2

  • MD5

    58b23e37d2c21f9c5bb879563d42a846

  • SHA1

    7727e5df9e2cf0c9268d587a61423bcb2f8071f7

  • SHA256

    dadd500d99efd2f2c88ff96616225acc3bbc163e2bf2365b3b33e01e7e854c19

  • SHA512

    d94388336b42d7d1154877185cb494fce960f746c91cf412f24caf1b7c6ced1d838bea19b89bf09061d54e7527a43fca36baf43808aa2475b0e9655b71d9769b

  • SSDEEP

    786432:2JooILqisBOchc/zawzJBlc2dz47u9n54tOzEadI:foI7GOzaM+q9n54tO7C

Score
8/10

Malware Config

Targets

    • Target

      58b23e37d2c21f9c5bb879563d42a846

    • Size

      30.6MB

    • MD5

      58b23e37d2c21f9c5bb879563d42a846

    • SHA1

      7727e5df9e2cf0c9268d587a61423bcb2f8071f7

    • SHA256

      dadd500d99efd2f2c88ff96616225acc3bbc163e2bf2365b3b33e01e7e854c19

    • SHA512

      d94388336b42d7d1154877185cb494fce960f746c91cf412f24caf1b7c6ced1d838bea19b89bf09061d54e7527a43fca36baf43808aa2475b0e9655b71d9769b

    • SSDEEP

      786432:2JooILqisBOchc/zawzJBlc2dz47u9n54tOzEadI:foI7GOzaM+q9n54tO7C

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks