General

  • Target

    91d44f2f0fb11dc93a06f1a9c085d0d03d8e6dd45e463297a4a032ff544f2218

  • Size

    28.2MB

  • Sample

    231220-jva7raaedq

  • MD5

    1847a72a3d66c637f4820268d85106bf

  • SHA1

    0c45e7d8f29fc27a376dbb439739fdf4e44646d1

  • SHA256

    91d44f2f0fb11dc93a06f1a9c085d0d03d8e6dd45e463297a4a032ff544f2218

  • SHA512

    1e5fab9cc8836b029f49f1af1ea8115e8df52b43ca8dc271defea929d0dee8fd7ee9458f8b3ebbb86024c60eb0633e12072fcf84c56599d9c5a6db196d72460f

  • SSDEEP

    786432:kfwnAx3gtWgULzhdrAddfmxY2G9hlEri8bmUvzS/WRHcW:kfwa3Y49eddfmyfWriULR8W

Malware Config

Targets

    • Target

      91d44f2f0fb11dc93a06f1a9c085d0d03d8e6dd45e463297a4a032ff544f2218

    • Size

      28.2MB

    • MD5

      1847a72a3d66c637f4820268d85106bf

    • SHA1

      0c45e7d8f29fc27a376dbb439739fdf4e44646d1

    • SHA256

      91d44f2f0fb11dc93a06f1a9c085d0d03d8e6dd45e463297a4a032ff544f2218

    • SHA512

      1e5fab9cc8836b029f49f1af1ea8115e8df52b43ca8dc271defea929d0dee8fd7ee9458f8b3ebbb86024c60eb0633e12072fcf84c56599d9c5a6db196d72460f

    • SSDEEP

      786432:kfwnAx3gtWgULzhdrAddfmxY2G9hlEri8bmUvzS/WRHcW:kfwa3Y49eddfmyfWriULR8W

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks