General

  • Target

    81d513b5ecf72073ad4389761449ec147762d478af4a994a95bdfdcef7c28e2a

  • Size

    26.8MB

  • Sample

    231220-d914tsafbr

  • MD5

    fb2aef61ee6fac5094062ce359c5a1fd

  • SHA1

    9c6d7fab1a68a7a6c2ad6640d0879cf69a9d4965

  • SHA256

    81d513b5ecf72073ad4389761449ec147762d478af4a994a95bdfdcef7c28e2a

  • SHA512

    2cc3c67fa9d5d9c01ff240cb9ac0bda111496cf6e6c6df8094c65cc50b188f5d67bf57c82925290aa5212c3692b8b1dd49fd27e8927adc9064ce07dc000963d4

  • SSDEEP

    786432:ev2y3oqbm3G8F/g8P1e/vfmSffPiZeY2R:e+4Fbm3/LPUnfmSK4

Score
7/10

Malware Config

Targets

    • Target

      81d513b5ecf72073ad4389761449ec147762d478af4a994a95bdfdcef7c28e2a

    • Size

      26.8MB

    • MD5

      fb2aef61ee6fac5094062ce359c5a1fd

    • SHA1

      9c6d7fab1a68a7a6c2ad6640d0879cf69a9d4965

    • SHA256

      81d513b5ecf72073ad4389761449ec147762d478af4a994a95bdfdcef7c28e2a

    • SHA512

      2cc3c67fa9d5d9c01ff240cb9ac0bda111496cf6e6c6df8094c65cc50b188f5d67bf57c82925290aa5212c3692b8b1dd49fd27e8927adc9064ce07dc000963d4

    • SSDEEP

      786432:ev2y3oqbm3G8F/g8P1e/vfmSffPiZeY2R:e+4Fbm3/LPUnfmSK4

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      mimo_asset.apk

    • Size

      390KB

    • MD5

      39692de7ff0848e54bf6ea1ce9ece672

    • SHA1

      bf6299d772f195bac724f738c49cdac0c538abe4

    • SHA256

      011c400d36773b3b475290c2d1af5a829c0597c24dfbb10e12222611a4e1300e

    • SHA512

      3ea7d8e4a85e1b8b7759984f817df7c65656d057e31b11ec1a970e79a99b775fca5e5f8ef942f99869a14b58a91c1a5838b5711ac33f915cf8f7f77280bcadc6

    • SSDEEP

      12288:hNx7RUQtEAQ5YXCA3xfDX2O9THkIMFsTTX5KOk5O:57RUQt35XCA3xz2O9TEJy3XIOkw

    Score
    1/10

MITRE ATT&CK Matrix

Tasks