General

  • Target

    d56509ec57eab22745787af3847ed1a5

  • Size

    17.8MB

  • Sample

    231222-smt5bsgadj

  • MD5

    d56509ec57eab22745787af3847ed1a5

  • SHA1

    7723308efc8fccc51ce51c0e59e8b629b4ac4882

  • SHA256

    7541204e23b18ebcda1c83885becda85fd9aed744cee316ecdb02274ada8bae4

  • SHA512

    12638800d8460f566c9d7535809b441c8c72b5945f9da0a12ca656970de3ad54cfa7613dc8eb08dad37ede3ea2da454f84b09416a466c488d36c703480a82ea0

  • SSDEEP

    393216:I3GGM8Rm55Sj0jkyvPVQwqIWVTFMNroIAB9J3qw:pGYQyvPW3zMc9J3H

Score
8/10

Malware Config

Targets

    • Target

      d56509ec57eab22745787af3847ed1a5

    • Size

      17.8MB

    • MD5

      d56509ec57eab22745787af3847ed1a5

    • SHA1

      7723308efc8fccc51ce51c0e59e8b629b4ac4882

    • SHA256

      7541204e23b18ebcda1c83885becda85fd9aed744cee316ecdb02274ada8bae4

    • SHA512

      12638800d8460f566c9d7535809b441c8c72b5945f9da0a12ca656970de3ad54cfa7613dc8eb08dad37ede3ea2da454f84b09416a466c488d36c703480a82ea0

    • SSDEEP

      393216:I3GGM8Rm55Sj0jkyvPVQwqIWVTFMNroIAB9J3qw:pGYQyvPW3zMc9J3H

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks