General

  • Target

    843e2fc00b24b6092e0a0bcd29f00dd0ebc22a7c9278f8948113effa8833d4dc

  • Size

    19.6MB

  • Sample

    231220-e48gdsfbc2

  • MD5

    9aef28f5c2e5fe45d36e1d9220f89d14

  • SHA1

    4f60718c1b4ec03b97f4def4101b1e08be5c843a

  • SHA256

    843e2fc00b24b6092e0a0bcd29f00dd0ebc22a7c9278f8948113effa8833d4dc

  • SHA512

    0d24679e13a5683afa2a21f7f0eabcdb17c42dfc8f0b73676ec796fda87b9c026b464dfa6b785fe85ba671eb5a76ba46cfee4bd836a9b46e706ad144872a0494

  • SSDEEP

    393216:nRj/HGeMncgqyF7NQfMGC8l0iUvVaDs0ycQtbZ2mpodvPWTD9Mb3obgo6B:RDkcgFF76fW80zd+dJGsQKWF6Oa

Score
8/10

Malware Config

Targets

    • Target

      843e2fc00b24b6092e0a0bcd29f00dd0ebc22a7c9278f8948113effa8833d4dc

    • Size

      19.6MB

    • MD5

      9aef28f5c2e5fe45d36e1d9220f89d14

    • SHA1

      4f60718c1b4ec03b97f4def4101b1e08be5c843a

    • SHA256

      843e2fc00b24b6092e0a0bcd29f00dd0ebc22a7c9278f8948113effa8833d4dc

    • SHA512

      0d24679e13a5683afa2a21f7f0eabcdb17c42dfc8f0b73676ec796fda87b9c026b464dfa6b785fe85ba671eb5a76ba46cfee4bd836a9b46e706ad144872a0494

    • SSDEEP

      393216:nRj/HGeMncgqyF7NQfMGC8l0iUvVaDs0ycQtbZ2mpodvPWTD9Mb3obgo6B:RDkcgFF76fW80zd+dJGsQKWF6Oa

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks