General

  • Target

    a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c

  • Size

    13.6MB

  • Sample

    231220-nacx3afhe6

  • MD5

    123f0c75a007faac87f197c210ae15df

  • SHA1

    152ea8dabd7ef13fc1e65e86abac20b4fcb7bc09

  • SHA256

    a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c

  • SHA512

    7183b23b20d8f8416580593b9664db5ffb0f87fb909ada0dc458b9cb5ab41d6da5cbed5361d615ca2b031969929ef66c2b233ab35226d50e7d108225315b01e7

  • SSDEEP

    393216:Txee8Of1VR9GHeNfoTbpBQnrpT7RB2ymNEHw3g8q:1JFN3QNpBMXwyAEhL

Score
8/10

Malware Config

Targets

    • Target

      a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c

    • Size

      13.6MB

    • MD5

      123f0c75a007faac87f197c210ae15df

    • SHA1

      152ea8dabd7ef13fc1e65e86abac20b4fcb7bc09

    • SHA256

      a8fabf06fc018761355d73e7aafed29a31749658a3e25ad34be8912f88c6aa0c

    • SHA512

      7183b23b20d8f8416580593b9664db5ffb0f87fb909ada0dc458b9cb5ab41d6da5cbed5361d615ca2b031969929ef66c2b233ab35226d50e7d108225315b01e7

    • SSDEEP

      393216:Txee8Of1VR9GHeNfoTbpBQnrpT7RB2ymNEHw3g8q:1JFN3QNpBMXwyAEhL

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks