General

  • Target

    7527ba0f89ab224704e192f3ced275a9407d93ca23e85b5dcaee8bad3fd5ca03

  • Size

    8.1MB

  • Sample

    231220-atbmfscccq

  • MD5

    44ee3d6a82ad7f5fadf1ea1bbdccccba

  • SHA1

    4330605f2152deb7dee126f08f91049763f6e309

  • SHA256

    7527ba0f89ab224704e192f3ced275a9407d93ca23e85b5dcaee8bad3fd5ca03

  • SHA512

    8fdd8d5c0edd527c4b9f31acb21faeeed577df4d6c472aab5321fca83c701bfbbfab7ee9b6b8c7baa3fbdacc66432fddfb00cf8c64e508814bbc5726e45c58d7

  • SSDEEP

    196608:caPUc+V1BANvk4LZ7ESgTGfxatt6OO8QszeIse0EQ6znTivdixy5kEwfc:caP9s1BANM0FEJuO/QsCqrLTivdGuGc

Score
7/10

Malware Config

Targets

    • Target

      7527ba0f89ab224704e192f3ced275a9407d93ca23e85b5dcaee8bad3fd5ca03

    • Size

      8.1MB

    • MD5

      44ee3d6a82ad7f5fadf1ea1bbdccccba

    • SHA1

      4330605f2152deb7dee126f08f91049763f6e309

    • SHA256

      7527ba0f89ab224704e192f3ced275a9407d93ca23e85b5dcaee8bad3fd5ca03

    • SHA512

      8fdd8d5c0edd527c4b9f31acb21faeeed577df4d6c472aab5321fca83c701bfbbfab7ee9b6b8c7baa3fbdacc66432fddfb00cf8c64e508814bbc5726e45c58d7

    • SSDEEP

      196608:caPUc+V1BANvk4LZ7ESgTGfxatt6OO8QszeIse0EQ6znTivdixy5kEwfc:caP9s1BANM0FEJuO/QsCqrLTivdGuGc

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      gdtadv2.jar

    • Size

      230KB

    • MD5

      33aeb27eefc5ae7838f01186e27d8816

    • SHA1

      2a7ef64266577916f05cc841c9f977ca8a34568f

    • SHA256

      c6a8f2838c910a50b56bddad227ebed00b8b32a6869a432c83964b1150ad2c59

    • SHA512

      ebd8ccc5750aa1c2a28e849149d0ef3d1c997479008a803a931ea10c82bd99d90797a99329690cbea6cbc18d45bbe481a5576abfe3ca8afc96dbb3974a0e00c5

    • SSDEEP

      6144:B8Obhi9RAdTKqZVGee8QXMLzKb/n4BQk+m:BbhiTAEQeVsWrn4BUm

    Score
    1/10

MITRE ATT&CK Matrix

Tasks