General

  • Target

    708178bc763762b9cb35d0a8885ac5c43e751815564b137a26d4b230c91b9ddf

  • Size

    5.9MB

  • Sample

    231220-abl1gadcf9

  • MD5

    b7f7ec7b04a14cf5a8bcbf64651f6239

  • SHA1

    c12d97a4f80faff6f7498434b6c532450c533afc

  • SHA256

    708178bc763762b9cb35d0a8885ac5c43e751815564b137a26d4b230c91b9ddf

  • SHA512

    e1b1d7bea749fcea749a1437a43bd8f24d05b2eef53d094fc8db55ac27bdfc0e4b193c0feec2843068865b990f553d7ff79b80bc3cc8ff8d6640ab159e6ed9a4

  • SSDEEP

    98304:8Fv+iHKtSoZGMAOZMbyRzltMnu1XcdwwVLmRTmL+asZ/XyyM91lRjhIEMKObtM9V:CWiqXK52plmRvIRTmaUWEitM/

Score
8/10

Malware Config

Targets

    • Target

      708178bc763762b9cb35d0a8885ac5c43e751815564b137a26d4b230c91b9ddf

    • Size

      5.9MB

    • MD5

      b7f7ec7b04a14cf5a8bcbf64651f6239

    • SHA1

      c12d97a4f80faff6f7498434b6c532450c533afc

    • SHA256

      708178bc763762b9cb35d0a8885ac5c43e751815564b137a26d4b230c91b9ddf

    • SHA512

      e1b1d7bea749fcea749a1437a43bd8f24d05b2eef53d094fc8db55ac27bdfc0e4b193c0feec2843068865b990f553d7ff79b80bc3cc8ff8d6640ab159e6ed9a4

    • SSDEEP

      98304:8Fv+iHKtSoZGMAOZMbyRzltMnu1XcdwwVLmRTmL+asZ/XyyM91lRjhIEMKObtM9V:CWiqXK52plmRvIRTmaUWEitM/

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      gdtadv2.jar

    • Size

      401KB

    • MD5

      31aee39aa595216667e149f1a151a2ab

    • SHA1

      701b4a1f11ed6eb42751250e86206ca8765d5410

    • SHA256

      36bc2a92f09ab333699a22a44182b1eeb7caab4f20f90b7eb1d239d82854f0fd

    • SHA512

      f020e1d4f2b741f057f43158d6c31d8f140642885cae82c9c70ddb47a7c50fdf419129e60ea0151b87a93739dcb6a967c1f3abdbe39d0b68483bb150ea29916e

    • SSDEEP

      12288:PEL4FK3na8JwMzTTbG2BDMnMlr0yvAcbPQxyuS:MLt62qnkrxfuG

    Score
    1/10

MITRE ATT&CK Matrix

Tasks