General

  • Target

    a781dfe5d800b44d5372ff5ae4c2485fe1b0ca97ebe9bca66bc3571064a8c4f3

  • Size

    26.7MB

  • Sample

    231220-m3xmhafcc5

  • MD5

    5d0c9e0e566282dc8c045969f2ae7206

  • SHA1

    3e53bbbec91dbca6049c86d1295feade5837254a

  • SHA256

    a781dfe5d800b44d5372ff5ae4c2485fe1b0ca97ebe9bca66bc3571064a8c4f3

  • SHA512

    bd2ec62e910ca8d5be9555eb261461db9b2aa1f952ddc0004f45ace761cd112b4a763da9723dfd832f39d95584ea7252cb9241c7879145e39c393f5acbf17d44

  • SSDEEP

    786432:7lp5gFyDjI69Z9iBh3EcC6SLOSUx8PGxRF+oyv:7lpqFyD863xjrLS2PGjdyv

Score
8/10

Malware Config

Targets

    • Target

      a781dfe5d800b44d5372ff5ae4c2485fe1b0ca97ebe9bca66bc3571064a8c4f3

    • Size

      26.7MB

    • MD5

      5d0c9e0e566282dc8c045969f2ae7206

    • SHA1

      3e53bbbec91dbca6049c86d1295feade5837254a

    • SHA256

      a781dfe5d800b44d5372ff5ae4c2485fe1b0ca97ebe9bca66bc3571064a8c4f3

    • SHA512

      bd2ec62e910ca8d5be9555eb261461db9b2aa1f952ddc0004f45ace761cd112b4a763da9723dfd832f39d95584ea7252cb9241c7879145e39c393f5acbf17d44

    • SSDEEP

      786432:7lp5gFyDjI69Z9iBh3EcC6SLOSUx8PGxRF+oyv:7lpqFyD863xjrLS2PGjdyv

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      amap_resource1_0_0.png

    • Size

      24KB

    • MD5

      94a2a5f84a3fd6f0fd9134708ae1b81e

    • SHA1

      1e21afaa48ed86cb31aaf7b17c3514315364cc99

    • SHA256

      fc0c21884d4edfa4d93282139a309f204b27271a111a5b158edbc048f730b461

    • SHA512

      24a175d15cb5cf8d23f0d53b004ed5c9a47646129c816fcae1b46aedabd95bb2c6dd2958d39d6f98f36dec3cd55d6af2d9b8f7013ced4b37a30db566e9a44923

    • SSDEEP

      384:SevEWnTSCwukBdJ4dVCHyP7MPi3oqYXgnJk:3vEWnSue4+Sf3opQa

    Score
    1/10

MITRE ATT&CK Matrix

Tasks