General

  • Target

    872d6f98c87cc9f9c7a447db24828ea9e00fc67d9eaa60cac45695f575c0e734

  • Size

    20.5MB

  • Sample

    231220-f3d2tsdean

  • MD5

    228194ec93d0130e26bb18d34dadfd46

  • SHA1

    9b14f15412fdc3a7b370d07fdbb0ddb132cab4ba

  • SHA256

    872d6f98c87cc9f9c7a447db24828ea9e00fc67d9eaa60cac45695f575c0e734

  • SHA512

    8050a23a47c87fae5fda7dd379e81a35742c00bb55bf221744a47674b6630ffcfcb4617968fda0c231683c3a4da0bcb96ba55c60dd65f68abbc8cab18f9caf11

  • SSDEEP

    393216:FmLO2sJA35z7A79L++0r1mbgafiubcLZXbfT9i/zVN2I+TXq1kKpPbNiRSKcsjJ4:owJA35z7c58BmbBffcVX9i/zVN2IkaOk

Malware Config

Targets

    • Target

      872d6f98c87cc9f9c7a447db24828ea9e00fc67d9eaa60cac45695f575c0e734

    • Size

      20.5MB

    • MD5

      228194ec93d0130e26bb18d34dadfd46

    • SHA1

      9b14f15412fdc3a7b370d07fdbb0ddb132cab4ba

    • SHA256

      872d6f98c87cc9f9c7a447db24828ea9e00fc67d9eaa60cac45695f575c0e734

    • SHA512

      8050a23a47c87fae5fda7dd379e81a35742c00bb55bf221744a47674b6630ffcfcb4617968fda0c231683c3a4da0bcb96ba55c60dd65f68abbc8cab18f9caf11

    • SSDEEP

      393216:FmLO2sJA35z7A79L++0r1mbgafiubcLZXbfT9i/zVN2I+TXq1kKpPbNiRSKcsjJ4:owJA35z7c58BmbBffcVX9i/zVN2IkaOk

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests dangerous framework permissions

MITRE ATT&CK Matrix

Tasks