General

  • Target

    7b24d27c9cede2fdc2a4b7707c2065082bbc1b039770234fb21096812b0e346c

  • Size

    28.3MB

  • Sample

    231220-b71deafcak

  • MD5

    c43501e33bdfc1784c800eb1413e2615

  • SHA1

    39cfff621197b4df2fc2adce911591b0191e4244

  • SHA256

    7b24d27c9cede2fdc2a4b7707c2065082bbc1b039770234fb21096812b0e346c

  • SHA512

    f91b19c40463f8b7499b8ed1878048ad485085ee54fab041e491183649efbdff83aa1b48a246c661a1013e09feecf0b7b84a795f59088327989bb87fb432c84e

  • SSDEEP

    393216:kVIN4X0ytqhi24tPypiGYNNieT4XCZzmEtElTARkh21EdP9420zicqHsz3rSwN3p:cIN4X0UzjG8JGGu4SFc2cqMz3rfgm

Score
8/10

Malware Config

Targets

    • Target

      7b24d27c9cede2fdc2a4b7707c2065082bbc1b039770234fb21096812b0e346c

    • Size

      28.3MB

    • MD5

      c43501e33bdfc1784c800eb1413e2615

    • SHA1

      39cfff621197b4df2fc2adce911591b0191e4244

    • SHA256

      7b24d27c9cede2fdc2a4b7707c2065082bbc1b039770234fb21096812b0e346c

    • SHA512

      f91b19c40463f8b7499b8ed1878048ad485085ee54fab041e491183649efbdff83aa1b48a246c661a1013e09feecf0b7b84a795f59088327989bb87fb432c84e

    • SSDEEP

      393216:kVIN4X0ytqhi24tPypiGYNNieT4XCZzmEtElTARkh21EdP9420zicqHsz3rSwN3p:cIN4X0UzjG8JGGu4SFc2cqMz3rfgm

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks