General

  • Target

    9aad28e3aec539e7bf2973d82e3da65df11e56f35d9a63b8d512dd1ce44855ca

  • Size

    1.1MB

  • Sample

    231220-k638caeecq

  • MD5

    dc00a85bdd094e5467b2da97dea217c7

  • SHA1

    f65cf066b331e61d7e1dd5f5d241c62a08611abf

  • SHA256

    9aad28e3aec539e7bf2973d82e3da65df11e56f35d9a63b8d512dd1ce44855ca

  • SHA512

    64902d60293163e1ae17dd60b901d8b173fa2893f5a2aeb095f3981ea53d8c1d3e8d0ac2d87b138d1ad63c0714c47739a1ede38cf66eaaf0b08df984f84d9f73

  • SSDEEP

    24576:H+k70fwACGQJnG9xGg7+hOkXkYmVwFheUKI2SmX59mRrY:H+kuwACG2G9xGg7SXkBe+UK359mRrY

Score
8/10

Malware Config

Targets

    • Target

      9aad28e3aec539e7bf2973d82e3da65df11e56f35d9a63b8d512dd1ce44855ca

    • Size

      1.1MB

    • MD5

      dc00a85bdd094e5467b2da97dea217c7

    • SHA1

      f65cf066b331e61d7e1dd5f5d241c62a08611abf

    • SHA256

      9aad28e3aec539e7bf2973d82e3da65df11e56f35d9a63b8d512dd1ce44855ca

    • SHA512

      64902d60293163e1ae17dd60b901d8b173fa2893f5a2aeb095f3981ea53d8c1d3e8d0ac2d87b138d1ad63c0714c47739a1ede38cf66eaaf0b08df984f84d9f73

    • SSDEEP

      24576:H+k70fwACGQJnG9xGg7+hOkXkYmVwFheUKI2SmX59mRrY:H+kuwACG2G9xGg7SXkBe+UK359mRrY

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      __pasys_remote_banner.jar

    • Size

      114KB

    • MD5

      2ad9fb4b2d9b333883b7e38f61c2fd2f

    • SHA1

      5b85041452d173ed0d81d25b9ca78608a998e328

    • SHA256

      b9310a99f1b60959f6b725eea74623dc491adec55da740c17e8c7e02f35818f5

    • SHA512

      6fc04e1e22ebf8920b4928a8086cf3e0814d155f79f80d71622916f6a0911262382710e5ee2acea653db4b387730e201134592cb9992b14f3aef8b09d83bda90

    • SSDEEP

      3072:9cU7bD2h2Z5ecVpoj8eVJBl52Dx9yW0jv2gspIn:m8n28Z5eAs8S73InyWmug9

    Score
    1/10

MITRE ATT&CK Matrix

Tasks