General

  • Target

    a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d

  • Size

    12.3MB

  • Sample

    231220-l82yqshbgm

  • MD5

    7d9f983a7b498051ab7a0cf3949c809e

  • SHA1

    0788293729e768267882e84ff6363ca324ad1f63

  • SHA256

    a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d

  • SHA512

    f7577c1020fe5c820e476babc88f0697d95850b42392c74739d1a02b9b11738f8c6e8b5d811e738253f252465b2f7fa5e8511f8c346755568bf82cd3ae6958d7

  • SSDEEP

    196608:0MGhO6IyCEztc02T1gQjfboAD9/434QkFyUyzaRRgytWlvrN9E/Ns:9GNc08hjbzJw3zPzoiy094/y

Score
8/10

Malware Config

Targets

    • Target

      a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d

    • Size

      12.3MB

    • MD5

      7d9f983a7b498051ab7a0cf3949c809e

    • SHA1

      0788293729e768267882e84ff6363ca324ad1f63

    • SHA256

      a089d4470def0e81acb955f29e7c1b415809cc3f9b56df30fa2681b09183370d

    • SHA512

      f7577c1020fe5c820e476babc88f0697d95850b42392c74739d1a02b9b11738f8c6e8b5d811e738253f252465b2f7fa5e8511f8c346755568bf82cd3ae6958d7

    • SSDEEP

      196608:0MGhO6IyCEztc02T1gQjfboAD9/434QkFyUyzaRRgytWlvrN9E/Ns:9GNc08hjbzJw3zPzoiy094/y

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      gdtadv2.jar

    • Size

      636KB

    • MD5

      cf57d4f9f2ccd86816c4f02989252423

    • SHA1

      6978f24478ba9baa004bf4d21db251fe67957ec2

    • SHA256

      e6df28c535e661d33a134407674c32555fb985a6a8f3bf8ec743150db61fa7ec

    • SHA512

      f759aea4c4fb91ce69f8238bd0e7c0f99b826cad04fc9c5f47c5afde2eceaf71d515d00f0e08b73c169e1a8bd21a17ddd3971bae27ddeb6960daaf5c5d719d4b

    • SSDEEP

      12288:lsocNwAPog24tsNbfevYHzN953QZlo5M0f+DMpP7x07S232vjUG:MNvPA9oYHzN953QEM0npDx0nm

    Score
    N/A

MITRE ATT&CK Matrix

Tasks