General

  • Target

    a051bc9280a289cecc73d804a8bb34dc8d2064aff2a82405b2357481c24f815d

  • Size

    11.2MB

  • Sample

    231220-l6qspahagj

  • MD5

    a7198dc4b00fcd4c25e9486dfc2e06fc

  • SHA1

    a82b40f2f70c41bc81a0442036df97921a56131c

  • SHA256

    a051bc9280a289cecc73d804a8bb34dc8d2064aff2a82405b2357481c24f815d

  • SHA512

    b81067d522db0651aacfb90a0ded10f53380a14cf20ab73b24b1c20d145522883af67a42c12329488c77da00c67f4f2bead615061d4831ba7fdd4f34fea50e80

  • SSDEEP

    196608:L3Jklnw65ABtWvkxqvxDWw9xaOTBCncBNHDjwpaGUnbpLBrnBfTdoBhacq6o:NuP2bWqmAkxcKNXwEGUnt1n+hH+

Malware Config

Targets

    • Target

      a051bc9280a289cecc73d804a8bb34dc8d2064aff2a82405b2357481c24f815d

    • Size

      11.2MB

    • MD5

      a7198dc4b00fcd4c25e9486dfc2e06fc

    • SHA1

      a82b40f2f70c41bc81a0442036df97921a56131c

    • SHA256

      a051bc9280a289cecc73d804a8bb34dc8d2064aff2a82405b2357481c24f815d

    • SHA512

      b81067d522db0651aacfb90a0ded10f53380a14cf20ab73b24b1c20d145522883af67a42c12329488c77da00c67f4f2bead615061d4831ba7fdd4f34fea50e80

    • SSDEEP

      196608:L3Jklnw65ABtWvkxqvxDWw9xaOTBCncBNHDjwpaGUnbpLBrnBfTdoBhacq6o:NuP2bWqmAkxcKNXwEGUnt1n+hH+

    Score
    10/10
    • Detected phishing page

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks