General

  • Target

    89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b

  • Size

    12.3MB

  • Sample

    231220-gnj5zaaaa2

  • MD5

    cbad052cbb38d362c2934ec764b3fcc2

  • SHA1

    8bbd8dd553ed0d49c4d29e09f6a1b55b63f5817e

  • SHA256

    89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b

  • SHA512

    b7b10b03aa087e20356cb6bd900a61af28dde58ee645bdd23a86dccd3c88858b42bb5e625f962284f166e093cff742e24173d379e02c473db178b333e809cb2a

  • SSDEEP

    393216:PyGMEFUV9nk5bz1ho70VgO7I/leC4coGZNlFNRqC:hY9k5X1ho70VgOsL4clXDNRqC

Score
8/10

Malware Config

Targets

    • Target

      89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b

    • Size

      12.3MB

    • MD5

      cbad052cbb38d362c2934ec764b3fcc2

    • SHA1

      8bbd8dd553ed0d49c4d29e09f6a1b55b63f5817e

    • SHA256

      89c42710fa4eda431b3efbf0670c1f793bbb667f14140c2371ec12ca90a3875b

    • SHA512

      b7b10b03aa087e20356cb6bd900a61af28dde58ee645bdd23a86dccd3c88858b42bb5e625f962284f166e093cff742e24173d379e02c473db178b333e809cb2a

    • SSDEEP

      393216:PyGMEFUV9nk5bz1ho70VgO7I/leC4coGZNlFNRqC:hY9k5X1ho70VgOsL4clXDNRqC

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks