General

  • Target

    990a64d1c10430f817c1d7a40b380ed63d48216faf7f744959df8cbef292a5c0

  • Size

    27.6MB

  • Sample

    231223-2mfflshhdj

  • MD5

    6603e1e753f62c5929ad59cabfb4187a

  • SHA1

    6672bbacb78d323c692cc8adafa55d8da087f067

  • SHA256

    990a64d1c10430f817c1d7a40b380ed63d48216faf7f744959df8cbef292a5c0

  • SHA512

    729a7f87a25e5b4a807d8242cdec3051e885f9dd66c427027e730bc6003bb2adb68519d1d7f2541feb2ca2a9b48093ae2d1d96908e49a6bd8580e604072c3918

  • SSDEEP

    786432:OiFkeB9GqI0+so/4wGnWJ1WlxYUhYLkV6a4a:dkeyqyr/4wuq04s4kVv

Score
8/10

Malware Config

Targets

    • Target

      990a64d1c10430f817c1d7a40b380ed63d48216faf7f744959df8cbef292a5c0

    • Size

      27.6MB

    • MD5

      6603e1e753f62c5929ad59cabfb4187a

    • SHA1

      6672bbacb78d323c692cc8adafa55d8da087f067

    • SHA256

      990a64d1c10430f817c1d7a40b380ed63d48216faf7f744959df8cbef292a5c0

    • SHA512

      729a7f87a25e5b4a807d8242cdec3051e885f9dd66c427027e730bc6003bb2adb68519d1d7f2541feb2ca2a9b48093ae2d1d96908e49a6bd8580e604072c3918

    • SSDEEP

      786432:OiFkeB9GqI0+so/4wGnWJ1WlxYUhYLkV6a4a:dkeyqyr/4wuq04s4kVv

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks