General

  • Target

    10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac

  • Size

    14.2MB

  • Sample

    231223-pk4n7shcgl

  • MD5

    810e14e6d19e10b54a4c414ff837ba45

  • SHA1

    676f36afdf0860dbdff7a3c456947ef83fdbf8b8

  • SHA256

    10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac

  • SHA512

    4f205a40cc6044730d1573bef9921f6a96270dcc9e04dd8c7629486c005bf5ac2314229ce073b3e09e1b3b982d7b785128fe833998a864d32216608b333e502f

  • SSDEEP

    393216:PBgNE1c/Ms2WXHF+hzhBiQ1xKy+Og+Ov9bi4xb2I5X:PBgNE1m9BIzviaxwVvRlnX

Score
8/10

Malware Config

Targets

    • Target

      10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac

    • Size

      14.2MB

    • MD5

      810e14e6d19e10b54a4c414ff837ba45

    • SHA1

      676f36afdf0860dbdff7a3c456947ef83fdbf8b8

    • SHA256

      10fcea9ef41d7a169915d2c4687ad3476e1c28b72f8338db98957e3ea53acaac

    • SHA512

      4f205a40cc6044730d1573bef9921f6a96270dcc9e04dd8c7629486c005bf5ac2314229ce073b3e09e1b3b982d7b785128fe833998a864d32216608b333e502f

    • SSDEEP

      393216:PBgNE1c/Ms2WXHF+hzhBiQ1xKy+Og+Ov9bi4xb2I5X:PBgNE1m9BIzviaxwVvRlnX

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads device software version

      Uses Android APIs to read software version number for the device (IMEI/SV for GSM devices).

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks