General

  • Target

    8d0f21ed6547a3f0e957ae18fc5bb004ba9742224c8fc274e811415946efeb2e

  • Size

    27.2MB

  • Sample

    231220-hm497agdgn

  • MD5

    c6ddc170da96855ad59c614a958f407a

  • SHA1

    e1e0c7c27eb39529eb3f7620e7915e45ce24aa3f

  • SHA256

    8d0f21ed6547a3f0e957ae18fc5bb004ba9742224c8fc274e811415946efeb2e

  • SHA512

    29e72c057dc79da85019400c4a6522f9184e635c4460a91147eef0bdfdaa19b18e3df0d60a37a9ac196dcf4dc2a64d18687dc2d6cad50a49fd31779fd71551b3

  • SSDEEP

    786432:CBsf5QdpLyylar70rCuAgBKpJpqNM0yNnc6b7:KdpLy5H8ZAseJQM0yb7

Score
8/10

Malware Config

Targets

    • Target

      8d0f21ed6547a3f0e957ae18fc5bb004ba9742224c8fc274e811415946efeb2e

    • Size

      27.2MB

    • MD5

      c6ddc170da96855ad59c614a958f407a

    • SHA1

      e1e0c7c27eb39529eb3f7620e7915e45ce24aa3f

    • SHA256

      8d0f21ed6547a3f0e957ae18fc5bb004ba9742224c8fc274e811415946efeb2e

    • SHA512

      29e72c057dc79da85019400c4a6522f9184e635c4460a91147eef0bdfdaa19b18e3df0d60a37a9ac196dcf4dc2a64d18687dc2d6cad50a49fd31779fd71551b3

    • SSDEEP

      786432:CBsf5QdpLyylar70rCuAgBKpJpqNM0yNnc6b7:KdpLy5H8ZAseJQM0yb7

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks