General

  • Target

    881ef58788f5817423277654d8b71e4945355562ff93440c7c52ba9366d1c0f2

  • Size

    16.8MB

  • Sample

    231220-f9y1ksdhan

  • MD5

    75e294c8e8506f551888c8cd59553bae

  • SHA1

    c926ffd63e8e93b6bafe50afc9cb017ab973c685

  • SHA256

    881ef58788f5817423277654d8b71e4945355562ff93440c7c52ba9366d1c0f2

  • SHA512

    c12bca0128de3fa2a2bf74650455993958fe0a7fbbaed4a679a8058e2b126160850a169aafad5bd514bf58c13ec31db963a8069bc3a1ee6fc25766ad52e64060

  • SSDEEP

    393216:QsQcoZ7cFpBYP88gFTvmamGhqoRKs90GrbHUkm3HCHLEdGN9V:/QcW7cY8bTvm2hNRKED/T8HCHLEENz

Malware Config

Targets

    • Target

      881ef58788f5817423277654d8b71e4945355562ff93440c7c52ba9366d1c0f2

    • Size

      16.8MB

    • MD5

      75e294c8e8506f551888c8cd59553bae

    • SHA1

      c926ffd63e8e93b6bafe50afc9cb017ab973c685

    • SHA256

      881ef58788f5817423277654d8b71e4945355562ff93440c7c52ba9366d1c0f2

    • SHA512

      c12bca0128de3fa2a2bf74650455993958fe0a7fbbaed4a679a8058e2b126160850a169aafad5bd514bf58c13ec31db963a8069bc3a1ee6fc25766ad52e64060

    • SSDEEP

      393216:QsQcoZ7cFpBYP88gFTvmamGhqoRKs90GrbHUkm3HCHLEdGN9V:/QcW7cY8bTvm2hNRKED/T8HCHLEENz

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks