General

  • Target

    893afe3662a22025650c2b2dcfb386b12810fa9fd4f7c2139a092b7ef46f6306

  • Size

    11.0MB

  • Sample

    231220-gkzq9ahgf8

  • MD5

    161f6ea466506a33bd15012c4d650659

  • SHA1

    41387f4f384101e0af977c5f38b6d068b88e1ada

  • SHA256

    893afe3662a22025650c2b2dcfb386b12810fa9fd4f7c2139a092b7ef46f6306

  • SHA512

    59a0cb1f5dc4854367b866f0db8e844059b0630395e055e53a228c50edcb626b1d6af122310282dde434d8ee88ae63f314b87c78172dee3489fa2fc080ce37df

  • SSDEEP

    196608:4J61XH0MK4lPqpzYCTTNpchj6C2UacT5ncJw9ZTYdwDTE24:4gV1qpzYCTTkhGC1JcgZTweTE24

Score
10/10

Malware Config

Targets

    • Target

      893afe3662a22025650c2b2dcfb386b12810fa9fd4f7c2139a092b7ef46f6306

    • Size

      11.0MB

    • MD5

      161f6ea466506a33bd15012c4d650659

    • SHA1

      41387f4f384101e0af977c5f38b6d068b88e1ada

    • SHA256

      893afe3662a22025650c2b2dcfb386b12810fa9fd4f7c2139a092b7ef46f6306

    • SHA512

      59a0cb1f5dc4854367b866f0db8e844059b0630395e055e53a228c50edcb626b1d6af122310282dde434d8ee88ae63f314b87c78172dee3489fa2fc080ce37df

    • SSDEEP

      196608:4J61XH0MK4lPqpzYCTTNpchj6C2UacT5ncJw9ZTYdwDTE24:4gV1qpzYCTTkhGC1JcgZTweTE24

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks