General

  • Target

    0b7dff0631aeea87b0e0f151f3c15a1bdf7f98be8ad4e85a8923b3cc1e6c2b78

  • Size

    10.4MB

  • Sample

    231223-n7vjdaahg3

  • MD5

    a45101f427cbc916bb10df62c39f33b9

  • SHA1

    4d207f9d3923e63b4ff7389d53574c54bfda47e7

  • SHA256

    0b7dff0631aeea87b0e0f151f3c15a1bdf7f98be8ad4e85a8923b3cc1e6c2b78

  • SHA512

    d26eaf8981cb83a3fd3d26fe3f45b486d8d51ac4d367cabd731d54112458809288e38047d826ff81b750b5ff45c6783a788dd6a74ac06306d17ff6739cbf67c7

  • SSDEEP

    196608:08VmFKgsSzYGm+H4N9TEbtzjRwedO/C4l7FRmkM/maN+6L/706dR9t0pCkpy8AFH:09Ys4bstzoC4m/LT0sRsA

Score
8/10

Malware Config

Targets

    • Target

      0b7dff0631aeea87b0e0f151f3c15a1bdf7f98be8ad4e85a8923b3cc1e6c2b78

    • Size

      10.4MB

    • MD5

      a45101f427cbc916bb10df62c39f33b9

    • SHA1

      4d207f9d3923e63b4ff7389d53574c54bfda47e7

    • SHA256

      0b7dff0631aeea87b0e0f151f3c15a1bdf7f98be8ad4e85a8923b3cc1e6c2b78

    • SHA512

      d26eaf8981cb83a3fd3d26fe3f45b486d8d51ac4d367cabd731d54112458809288e38047d826ff81b750b5ff45c6783a788dd6a74ac06306d17ff6739cbf67c7

    • SSDEEP

      196608:08VmFKgsSzYGm+H4N9TEbtzjRwedO/C4l7FRmkM/maN+6L/706dR9t0pCkpy8AFH:09Ys4bstzoC4m/LT0sRsA

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks