General

  • Target

    147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc

  • Size

    30.2MB

  • Sample

    231223-pv285ahghp

  • MD5

    3ee34bb1560320bfdb2f12fc581e2ada

  • SHA1

    f91d6f7512650129fa0751143a4a631c7de06a2e

  • SHA256

    147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc

  • SHA512

    b7158da7f32286ac754bbc76e982d5263b6cdcfed65adf8610ea988d058d412c4ca53c953b27f1d3f94e35ca0df589e37760f2398504f73dc4149ba42ac3a75b

  • SSDEEP

    786432:x9ZbNTA4jWmfrGOfPkCXbUmCuB803Q2i+/qPwu8i:x9ZbNT5jDdJbRW891SPhP

Score
8/10

Malware Config

Targets

    • Target

      147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc

    • Size

      30.2MB

    • MD5

      3ee34bb1560320bfdb2f12fc581e2ada

    • SHA1

      f91d6f7512650129fa0751143a4a631c7de06a2e

    • SHA256

      147c46ce8ebcd627073a1df1be89a3c564f51fc2ca68b329499748448b1a74bc

    • SHA512

      b7158da7f32286ac754bbc76e982d5263b6cdcfed65adf8610ea988d058d412c4ca53c953b27f1d3f94e35ca0df589e37760f2398504f73dc4149ba42ac3a75b

    • SSDEEP

      786432:x9ZbNTA4jWmfrGOfPkCXbUmCuB803Q2i+/qPwu8i:x9ZbNT5jDdJbRW891SPhP

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks