General

  • Target

    a0449b6e7f5100d19372c3de21c17185e623e0c508d9c3cdfb2670c0cbc021cd

  • Size

    10.5MB

  • Sample

    231223-3fk8yscha9

  • MD5

    d8e9acf545bc9a64a691716bb3890ca3

  • SHA1

    bf98b6e34bfd24041479994988ed46b93747d4e8

  • SHA256

    a0449b6e7f5100d19372c3de21c17185e623e0c508d9c3cdfb2670c0cbc021cd

  • SHA512

    c75fc4b0669d74a93ed77f204a65687d1eab42f244787d689ad0d8bfbf3c9eba3a5358a08934a2e96eeb16ab1ddba1f9ac5d25580e804487df63000443ccb7e3

  • SSDEEP

    196608:dBCH/5G2/5k5RLk68CS21RTE5WA3+WPvmE5UJINc2coiiCieRdN4jEGyQax:LCHp/5WRk6NS55W/WPvdaINc2jiOeRme

Score
7/10

Malware Config

Targets

    • Target

      a0449b6e7f5100d19372c3de21c17185e623e0c508d9c3cdfb2670c0cbc021cd

    • Size

      10.5MB

    • MD5

      d8e9acf545bc9a64a691716bb3890ca3

    • SHA1

      bf98b6e34bfd24041479994988ed46b93747d4e8

    • SHA256

      a0449b6e7f5100d19372c3de21c17185e623e0c508d9c3cdfb2670c0cbc021cd

    • SHA512

      c75fc4b0669d74a93ed77f204a65687d1eab42f244787d689ad0d8bfbf3c9eba3a5358a08934a2e96eeb16ab1ddba1f9ac5d25580e804487df63000443ccb7e3

    • SSDEEP

      196608:dBCH/5G2/5k5RLk68CS21RTE5WA3+WPvmE5UJINc2coiiCieRdN4jEGyQax:LCHp/5WRk6NS55W/WPvdaINc2jiOeRme

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      bdxadsdk.jar

    • Size

      85KB

    • MD5

      3c850ffec5bdd850f123077ca210a411

    • SHA1

      1c1ae4678b8a3b65640f047cb1bd72bc70d66f97

    • SHA256

      516023ce55fff40074d3c3d9016c023b1fc7dfba2b59c172f89141f1484d418e

    • SHA512

      aa3611687b6140ee9214392a84bc1ef55a6425a84a4e413dfcb2e936a931b9015e1e4ec53ad73539d26622427f9e6da0eae5c58ffc18285de42fc15639d786dd

    • SSDEEP

      1536:E4A1vm52J1h/mgxeek9/Ckkf1THL8BNbM/DXO8Q/3yJ463v6hHA0UGcVrSj:e9mkJ1tmg/I/tkdP8sa80O42uXcVrE

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      230KB

    • MD5

      39b3b45493a73ac914e00aebc4831040

    • SHA1

      5f435afd5652a34559cad3495aa0274b69bed763

    • SHA256

      9d78a9c9350130f8a57618278172bf07d302e1c373691b604133138d853af527

    • SHA512

      3ab8844120bdaf14f6f75b1ea199a6e5cf182f18e7b4e08ae0517a6f70bce09fc855f15463280111b3992b6f65a8743e031064b3185aa00e62eefed2a9e5e0de

    • SSDEEP

      6144:8z7P+KAFiHKCac3IRT1xgD0QWZyEcwlAObvZ:8zKKMiHKCac32Tz40PHVp1

    Score
    1/10

MITRE ATT&CK Matrix

Tasks