General

  • Target

    71f4f544d0e3516c8ab7bcaa6808c270f407140254155c78b7105a65571973d7

  • Size

    8.3MB

  • Sample

    231220-ae9wpsdgf5

  • MD5

    aecda86eb27797080be91d386f661169

  • SHA1

    f4f982caccf915d25e69fb677eab9ef7de585783

  • SHA256

    71f4f544d0e3516c8ab7bcaa6808c270f407140254155c78b7105a65571973d7

  • SHA512

    fdfda2b1011c4ceb70ba6a74245862206b19ebb35119fc2e022c6b554dbe11410b311527de72f31890202367d2e60600736b4160c9d973aec056440d5c97eb07

  • SSDEEP

    196608:tjMA6XUWAtiSE0vno4IBtxhLDSNWAtiZSlRmw/vUcYCjEF7I1iF8La2:tAA67aitklRmwJyF7IMFEa2

Score
8/10

Malware Config

Targets

    • Target

      71f4f544d0e3516c8ab7bcaa6808c270f407140254155c78b7105a65571973d7

    • Size

      8.3MB

    • MD5

      aecda86eb27797080be91d386f661169

    • SHA1

      f4f982caccf915d25e69fb677eab9ef7de585783

    • SHA256

      71f4f544d0e3516c8ab7bcaa6808c270f407140254155c78b7105a65571973d7

    • SHA512

      fdfda2b1011c4ceb70ba6a74245862206b19ebb35119fc2e022c6b554dbe11410b311527de72f31890202367d2e60600736b4160c9d973aec056440d5c97eb07

    • SSDEEP

      196608:tjMA6XUWAtiSE0vno4IBtxhLDSNWAtiZSlRmw/vUcYCjEF7I1iF8La2:tAA67aitklRmwJyF7IMFEa2

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks