General

  • Target

    9d29bb73c0e2039b230aa8ffdf4a5b23e848b347b400cf5ece4739de0bad8ca8

  • Size

    9.9MB

  • Sample

    231220-ljfzzaffbr

  • MD5

    710f389dc2ff047a12267eb95ed09721

  • SHA1

    2b15ec22398fa05056c34931d230a12067d7f88d

  • SHA256

    9d29bb73c0e2039b230aa8ffdf4a5b23e848b347b400cf5ece4739de0bad8ca8

  • SHA512

    e27dfd0ba2de9f069126a36e3dc13c2ac120577afc18ffba082f9f8c91c956b9f3173b839c062e415da8a2ad0a05922eed3908bb460fcfafdf94eeb64dce2605

  • SSDEEP

    196608:O0w1W+PfIdiRJ+IaPyQRzy3DLMmdTBlbGFBrTp/hsbBLD8wj:O0UfId31/zCDLMSiFBrT5a1LDFj

Score
8/10

Malware Config

Targets

    • Target

      9d29bb73c0e2039b230aa8ffdf4a5b23e848b347b400cf5ece4739de0bad8ca8

    • Size

      9.9MB

    • MD5

      710f389dc2ff047a12267eb95ed09721

    • SHA1

      2b15ec22398fa05056c34931d230a12067d7f88d

    • SHA256

      9d29bb73c0e2039b230aa8ffdf4a5b23e848b347b400cf5ece4739de0bad8ca8

    • SHA512

      e27dfd0ba2de9f069126a36e3dc13c2ac120577afc18ffba082f9f8c91c956b9f3173b839c062e415da8a2ad0a05922eed3908bb460fcfafdf94eeb64dce2605

    • SSDEEP

      196608:O0w1W+PfIdiRJ+IaPyQRzy3DLMmdTBlbGFBrTp/hsbBLD8wj:O0UfId31/zCDLMSiFBrT5a1LDFj

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks