General

  • Target

    86705da2b68771a0c14e5eb5f2be2d60b62ddfff0bae5115f905dac2bb40e632

  • Size

    6.4MB

  • Sample

    231220-fs9ezsgca7

  • MD5

    2a1f474b175bb9b62803304e44c955ea

  • SHA1

    6d1a02d56d1fc924a9f8b8de21621b87b41b4815

  • SHA256

    86705da2b68771a0c14e5eb5f2be2d60b62ddfff0bae5115f905dac2bb40e632

  • SHA512

    a038f83bbd2b0edfa356276b4c1006abddd0753c75286eac0eef09da9108f78925ae2f953247d93d3782b83c6edc114175ab8f5e06490f2039fd57a9c9097a80

  • SSDEEP

    196608:QRfoghC/Zddmkwvtfx2TDmDOG22ZppvwrkDlHeK:wxedSfmqj22ZnorEpeK

Score
8/10

Malware Config

Targets

    • Target

      86705da2b68771a0c14e5eb5f2be2d60b62ddfff0bae5115f905dac2bb40e632

    • Size

      6.4MB

    • MD5

      2a1f474b175bb9b62803304e44c955ea

    • SHA1

      6d1a02d56d1fc924a9f8b8de21621b87b41b4815

    • SHA256

      86705da2b68771a0c14e5eb5f2be2d60b62ddfff0bae5115f905dac2bb40e632

    • SHA512

      a038f83bbd2b0edfa356276b4c1006abddd0753c75286eac0eef09da9108f78925ae2f953247d93d3782b83c6edc114175ab8f5e06490f2039fd57a9c9097a80

    • SSDEEP

      196608:QRfoghC/Zddmkwvtfx2TDmDOG22ZppvwrkDlHeK:wxedSfmqj22ZnorEpeK

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Matrix

Tasks