General

  • Target

    9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0

  • Size

    6.0MB

  • Sample

    231220-le929afchj

  • MD5

    1210b9ea71ce85a13b14dd0d60882330

  • SHA1

    ff6f1fe491a756fc8ce1ed4305ac013022213996

  • SHA256

    9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0

  • SHA512

    418cf03685032aee755efb7ac06b0c0b5f58c8a005237c6b6e84c3f3601e054bd394565b5c450896361e27aa9f67f7c954544d4960b33219b8fc2fa2534bf36a

  • SSDEEP

    98304:eppBb1scCz4waj08lDbHFHK96kCLa9cIJ5CLKSDdE3s+c7UUmMfoabg+k4g8MnfM:eZacCUwCxlDbQ9zCLOJsLnE3sBLW+k4n

Score
8/10

Malware Config

Targets

    • Target

      9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0

    • Size

      6.0MB

    • MD5

      1210b9ea71ce85a13b14dd0d60882330

    • SHA1

      ff6f1fe491a756fc8ce1ed4305ac013022213996

    • SHA256

      9cb752d561772681c4ef2c5d1bf0febdd3e92f9a3f0928bb27a27f96de1da6b0

    • SHA512

      418cf03685032aee755efb7ac06b0c0b5f58c8a005237c6b6e84c3f3601e054bd394565b5c450896361e27aa9f67f7c954544d4960b33219b8fc2fa2534bf36a

    • SSDEEP

      98304:eppBb1scCz4waj08lDbHFHK96kCLa9cIJ5CLKSDdE3s+c7UUmMfoabg+k4g8MnfM:eZacCUwCxlDbQ9zCLOJsLnE3sBLW+k4n

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      gdtadv2.jar

    • Size

      1.3MB

    • MD5

      01f70d1d95d57cd79721b63d136f5b37

    • SHA1

      502039e99f6279154bda5aeda798581d717e0eca

    • SHA256

      1272f39dcb017f793f517c8d852d64ac666db51bd5f20179a2ac8266861b236f

    • SHA512

      d9446ac3905b10cd453a9259eaa0f03de163c59fc160f5164fbc30760b477e61094efe6e0d58b9c39bb6a4e91c640c704766552d2a2722d5e6d7c2ba628bf55a

    • SSDEEP

      24576:oM5KOCgm1RjzNxk9hJqp6OVGnhfqsT3XqhjCPwoVA7EtLOjZj401Uk/nd2ZPKbn/:95KF1RvNK9hkohisTn4jCI4fONj40v/R

    Score
    N/A

MITRE ATT&CK Matrix

Tasks