General

  • Target

    7d4abbe29e55ca2ff81bc0dc0c6651dcc7fcf9eb0e72cba3a4a127f8b075e8df

  • Size

    8.6MB

  • Sample

    231220-cs71dagcbq

  • MD5

    66f093bd4f9269c1cd35904a3f4c8ab3

  • SHA1

    368de5a90791962d8bd7ce6b5ddd63e2a37c272f

  • SHA256

    7d4abbe29e55ca2ff81bc0dc0c6651dcc7fcf9eb0e72cba3a4a127f8b075e8df

  • SHA512

    c59c2eff7c19cdce2d455f4237fa8d41b6c2cf87a0647a1e86135b296d94c259078160173d7939588cb53a5ededa09ec86955c049db4f7a7ac998006c62f0fdb

  • SSDEEP

    196608:FA33SI3EZ/hsMw5ZIxvIae0aeRRfVfgsI04zF4:qnnhMw5jwaeRvBI0WF4

Score
7/10

Malware Config

Targets

    • Target

      7d4abbe29e55ca2ff81bc0dc0c6651dcc7fcf9eb0e72cba3a4a127f8b075e8df

    • Size

      8.6MB

    • MD5

      66f093bd4f9269c1cd35904a3f4c8ab3

    • SHA1

      368de5a90791962d8bd7ce6b5ddd63e2a37c272f

    • SHA256

      7d4abbe29e55ca2ff81bc0dc0c6651dcc7fcf9eb0e72cba3a4a127f8b075e8df

    • SHA512

      c59c2eff7c19cdce2d455f4237fa8d41b6c2cf87a0647a1e86135b296d94c259078160173d7939588cb53a5ededa09ec86955c049db4f7a7ac998006c62f0fdb

    • SSDEEP

      196608:FA33SI3EZ/hsMw5ZIxvIae0aeRRfVfgsI04zF4:qnnhMw5jwaeRvBI0WF4

    Score
    7/10
    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Matrix

Tasks