General

  • Target

    7f603216a0a7bae2c8cec65a800608ac22cfff8cd98c699677e44d36267a9798

  • Size

    6.7MB

  • Sample

    231220-dfdfnshcek

  • MD5

    43bd113a0952172bcba57055f5a707bb

  • SHA1

    accdbdc724fbe4a45c4de5f9f0bdfc369e8fb35d

  • SHA256

    7f603216a0a7bae2c8cec65a800608ac22cfff8cd98c699677e44d36267a9798

  • SHA512

    cfd33f70fe0bc7de2e2af0f58c3eb215e8326e2bd694b0bd6ff9183abfdc5bf742f2e713ef21fc634ce2d38f8945b88e9a972b996af71c0f3a71616c74255845

  • SSDEEP

    196608:wJevH3JnYUuWf6p0JyzMJh0XPfZWxFiFyTnf:wJev3JYUuZylGf8Cyf

Score
10/10

Malware Config

Extracted

Family

furball

C2

http://www.firmwaresystemupdate.com/mmh

Targets

    • Target

      7f603216a0a7bae2c8cec65a800608ac22cfff8cd98c699677e44d36267a9798

    • Size

      6.7MB

    • MD5

      43bd113a0952172bcba57055f5a707bb

    • SHA1

      accdbdc724fbe4a45c4de5f9f0bdfc369e8fb35d

    • SHA256

      7f603216a0a7bae2c8cec65a800608ac22cfff8cd98c699677e44d36267a9798

    • SHA512

      cfd33f70fe0bc7de2e2af0f58c3eb215e8326e2bd694b0bd6ff9183abfdc5bf742f2e713ef21fc634ce2d38f8945b88e9a972b996af71c0f3a71616c74255845

    • SSDEEP

      196608:wJevH3JnYUuWf6p0JyzMJh0XPfZWxFiFyTnf:wJev3JYUuZylGf8Cyf

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks