General

  • Target

    9aa7fb148d19af8d663cfcccdc6fa4dde1e2b33f423c184c9aa8a05cd65b6561

  • Size

    13.2MB

  • Sample

    231220-k6ws9shff2

  • MD5

    add8ff75ac7e849ffba3d3dc6bdad02c

  • SHA1

    e82747ccc9ccc16318d46c30c28faa7132dcb0cb

  • SHA256

    9aa7fb148d19af8d663cfcccdc6fa4dde1e2b33f423c184c9aa8a05cd65b6561

  • SHA512

    4e605bbbe4963b42758ca57bf6b295ae8d426381eb28107310aa7d9de117f804dbda7d31738ddb753231cd1c895689982c888740337118dcf771bc2b932c487b

  • SSDEEP

    196608:b/uVicT9/cflA61qIrM5+Y9e5ofFi3MCoy7NoOzv+utcUFQK3BpT53aKUQfzxgCk:b/ujcKeeBFi3PoOoSmuHHXTEKUEg8Ux

Score
8/10

Malware Config

Targets

    • Target

      9aa7fb148d19af8d663cfcccdc6fa4dde1e2b33f423c184c9aa8a05cd65b6561

    • Size

      13.2MB

    • MD5

      add8ff75ac7e849ffba3d3dc6bdad02c

    • SHA1

      e82747ccc9ccc16318d46c30c28faa7132dcb0cb

    • SHA256

      9aa7fb148d19af8d663cfcccdc6fa4dde1e2b33f423c184c9aa8a05cd65b6561

    • SHA512

      4e605bbbe4963b42758ca57bf6b295ae8d426381eb28107310aa7d9de117f804dbda7d31738ddb753231cd1c895689982c888740337118dcf771bc2b932c487b

    • SSDEEP

      196608:b/uVicT9/cflA61qIrM5+Y9e5ofFi3MCoy7NoOzv+utcUFQK3BpT53aKUQfzxgCk:b/ujcKeeBFi3PoOoSmuHHXTEKUEg8Ux

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      PlayerUIApk.apk

    • Size

      121KB

    • MD5

      bfb5f2f10dec99ad7dfb9802f4b409c4

    • SHA1

      30f463422bf2a873f084b591d013034a600358c6

    • SHA256

      98c699945a8b233732bdfeccef24640d938a781a35f2aad104dce3a62e55c895

    • SHA512

      923fb9243368a2492883beb1f8e2722c6cfefb8c749f9b8940646c8513a4f2f312c6c423b5e15c00cf7a0c436f80bb9cb6c97185a31371b30120a2739c78d187

    • SSDEEP

      3072:6F45qDOeq+HGWZoFEh4YVLeTYJ90wHvDsEb6RI:8DzgehRdey90SvN8I

    Score
    1/10

MITRE ATT&CK Matrix

Tasks