General

  • Target

    9fafdb5108701305af1ccf1efd42fc17af1ce263528a9d983cd8f35883f6ec3d

  • Size

    9.1MB

  • Sample

    231220-l36dzagghm

  • MD5

    b86b5b10cac5327236eb9e4a07e1fcbd

  • SHA1

    93f1c0b769ed9a180ad8855db36dde9d649d94bf

  • SHA256

    9fafdb5108701305af1ccf1efd42fc17af1ce263528a9d983cd8f35883f6ec3d

  • SHA512

    afb7404135c72c742921b8fc03894f7f3ded9e446be0dd862d8abcf7f8dd066120be863f44593924c681eec3b819cb74aa7b84e1ded83156612212c4247399d6

  • SSDEEP

    196608:YC8Czf1ONR6Oat0zlmwjccANm35tg+wkgbYoO3ZU8GcNZCAz7vaWajj:j8Czf1eRHzlm6ccp5tg+wzbYoO3ZDGcq

Score
8/10

Malware Config

Targets

    • Target

      9fafdb5108701305af1ccf1efd42fc17af1ce263528a9d983cd8f35883f6ec3d

    • Size

      9.1MB

    • MD5

      b86b5b10cac5327236eb9e4a07e1fcbd

    • SHA1

      93f1c0b769ed9a180ad8855db36dde9d649d94bf

    • SHA256

      9fafdb5108701305af1ccf1efd42fc17af1ce263528a9d983cd8f35883f6ec3d

    • SHA512

      afb7404135c72c742921b8fc03894f7f3ded9e446be0dd862d8abcf7f8dd066120be863f44593924c681eec3b819cb74aa7b84e1ded83156612212c4247399d6

    • SSDEEP

      196608:YC8Czf1ONR6Oat0zlmwjccANm35tg+wkgbYoO3ZU8GcNZCAz7vaWajj:j8Czf1eRHzlm6ccp5tg+wzbYoO3ZDGcq

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks