General

  • Target

    94c88dbff34ca29bb501eee31caff6854f1622f0dca6dfb7d21936d245adf152

  • Size

    26.0MB

  • Sample

    231223-1x59cahecl

  • MD5

    4ea476964e48a78d2b37d1c3b88afd57

  • SHA1

    39d543ee2e9a4bab5ab31bc80fe621cbbf19b795

  • SHA256

    94c88dbff34ca29bb501eee31caff6854f1622f0dca6dfb7d21936d245adf152

  • SHA512

    c8b640cf2b8d48f3032004df106767adfef062dce416ba024674221d6cb2857f56868a24c65eb74b6bd71ddd390cfd9de971df7013bd7ffc74434ddc3d30bf26

  • SSDEEP

    786432:+BY+RZvq/FO2wadybvH2r+PJdQyxJ6UXSk80iUz9+Lhh:mHRZvq/QHsSvWrMdQy+Wg5UzcLhh

Score
8/10

Malware Config

Targets

    • Target

      94c88dbff34ca29bb501eee31caff6854f1622f0dca6dfb7d21936d245adf152

    • Size

      26.0MB

    • MD5

      4ea476964e48a78d2b37d1c3b88afd57

    • SHA1

      39d543ee2e9a4bab5ab31bc80fe621cbbf19b795

    • SHA256

      94c88dbff34ca29bb501eee31caff6854f1622f0dca6dfb7d21936d245adf152

    • SHA512

      c8b640cf2b8d48f3032004df106767adfef062dce416ba024674221d6cb2857f56868a24c65eb74b6bd71ddd390cfd9de971df7013bd7ffc74434ddc3d30bf26

    • SSDEEP

      786432:+BY+RZvq/FO2wadybvH2r+PJdQyxJ6UXSk80iUz9+Lhh:mHRZvq/QHsSvWrMdQy+Wg5UzcLhh

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks