General

  • Target

    9c0047b1683d9ce6d29b95b1a06a65555b6d99e3814ba1fbd3c37a02dd553349

  • Size

    8.7MB

  • Sample

    231220-lbx9aafadj

  • MD5

    441f1327a16f623ade53f8a8cdb0ac5b

  • SHA1

    ecb3b64bf7fa9b706bd43b70921eb98835809ae3

  • SHA256

    9c0047b1683d9ce6d29b95b1a06a65555b6d99e3814ba1fbd3c37a02dd553349

  • SHA512

    d245c8632d74cb44bed680e710fcabe49ba71fe57c87a474669da4cbd9f5ae1a7ee78968a96d3900185c7793c805986c3ebf5f5fb0968c215d17843baf9d5e00

  • SSDEEP

    196608:uWVLcBpBZ9Fp6icxpvqvXY5m+ja3/i5rHNWTTzqP4vOx:XLcBpBZpj4lFjysYTTzqPOG

Score
7/10

Malware Config

Targets

    • Target

      9c0047b1683d9ce6d29b95b1a06a65555b6d99e3814ba1fbd3c37a02dd553349

    • Size

      8.7MB

    • MD5

      441f1327a16f623ade53f8a8cdb0ac5b

    • SHA1

      ecb3b64bf7fa9b706bd43b70921eb98835809ae3

    • SHA256

      9c0047b1683d9ce6d29b95b1a06a65555b6d99e3814ba1fbd3c37a02dd553349

    • SHA512

      d245c8632d74cb44bed680e710fcabe49ba71fe57c87a474669da4cbd9f5ae1a7ee78968a96d3900185c7793c805986c3ebf5f5fb0968c215d17843baf9d5e00

    • SSDEEP

      196608:uWVLcBpBZ9Fp6icxpvqvXY5m+ja3/i5rHNWTTzqP4vOx:XLcBpBZpj4lFjysYTTzqPOG

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      gdtadv2.jar

    • Size

      149KB

    • MD5

      5bbd4987057c6aa8f1992d72206c68a9

    • SHA1

      3a2b6dae68dce8239f680c2684c648238bc1bf36

    • SHA256

      2a7fea6e019debe6a0b0c8a5bff40a0451133d3f122d3bcb8f28aed615c50539

    • SHA512

      ec138779d809f32ffe54998314263546f630fef799bb3cbf61fd494706724a3f756e0b3a5e721765b121a053b56cbe3e39f8edd09c17cae8289d677f9c4b8f73

    • SSDEEP

      3072:s9ECghK7Pic1Oy3c/obh2acQZD8+jb1gUKno8+l7kSVi:sig7KijlbhncQ58CCUKolkSM

    Score
    1/10

MITRE ATT&CK Matrix

Tasks