General

  • Target

    7d9bdd75e8e253ddfa2073a73be629056b6a7500d0d729c4a57262ab313c8cf2

  • Size

    21.9MB

  • Sample

    231220-cwn2nsbeb4

  • MD5

    423ab58e9349042170917263eee613ed

  • SHA1

    107a7c3319ef425a1b149eab4eab398927b34c14

  • SHA256

    7d9bdd75e8e253ddfa2073a73be629056b6a7500d0d729c4a57262ab313c8cf2

  • SHA512

    e83e41cc751523b19c27920d6a2ec30e3c7c2c217bec86a61fe60d81e2669f38cdf327dea5c9ccc57672a739dfb74bfb92dad231684fd6002c1e324266e729b8

  • SSDEEP

    393216:VhaF5FaYvSEoHE+0t2EI1SVFCQT1DR0i0W9co8x+b7qjwEAQpSBg:VhaFWYvSEoHE2SVpT1DB0kte+iUQF

Malware Config

Targets

    • Target

      7d9bdd75e8e253ddfa2073a73be629056b6a7500d0d729c4a57262ab313c8cf2

    • Size

      21.9MB

    • MD5

      423ab58e9349042170917263eee613ed

    • SHA1

      107a7c3319ef425a1b149eab4eab398927b34c14

    • SHA256

      7d9bdd75e8e253ddfa2073a73be629056b6a7500d0d729c4a57262ab313c8cf2

    • SHA512

      e83e41cc751523b19c27920d6a2ec30e3c7c2c217bec86a61fe60d81e2669f38cdf327dea5c9ccc57672a739dfb74bfb92dad231684fd6002c1e324266e729b8

    • SSDEEP

      393216:VhaF5FaYvSEoHE+0t2EI1SVFCQT1DR0i0W9co8x+b7qjwEAQpSBg:VhaFWYvSEoHE2SVpT1DB0kte+iUQF

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks