General

  • Target

    1c2382b52245929ee570c7c0be38cb865492d3fbe9a0c4cc1bf5d968cac85a23

  • Size

    11.5MB

  • Sample

    231223-qevpsaddf4

  • MD5

    bc3fcc8cafa5dae8662cb88f278571cd

  • SHA1

    e851f53c93077ad245a6138cdd293a11847a1ab8

  • SHA256

    1c2382b52245929ee570c7c0be38cb865492d3fbe9a0c4cc1bf5d968cac85a23

  • SHA512

    8a6224092e61586eb56ff7d1dd2a980162cc042ee5108d87edeb5df5b20daad389acb82efdff5d2b1168b2a265d3edb45b85d49a9545ae9119edb8d073c85577

  • SSDEEP

    196608:mh94ew2CYErBjQk0QiZUHmkCKcbtwTOVcGGLxQRgKY5UlFrn6iXI8Pdeyq3jQmle:24ew2+djLRHmBKc+QRdY5Wn1I8WQmltQ

Score
8/10

Malware Config

Targets

    • Target

      1c2382b52245929ee570c7c0be38cb865492d3fbe9a0c4cc1bf5d968cac85a23

    • Size

      11.5MB

    • MD5

      bc3fcc8cafa5dae8662cb88f278571cd

    • SHA1

      e851f53c93077ad245a6138cdd293a11847a1ab8

    • SHA256

      1c2382b52245929ee570c7c0be38cb865492d3fbe9a0c4cc1bf5d968cac85a23

    • SHA512

      8a6224092e61586eb56ff7d1dd2a980162cc042ee5108d87edeb5df5b20daad389acb82efdff5d2b1168b2a265d3edb45b85d49a9545ae9119edb8d073c85577

    • SSDEEP

      196608:mh94ew2CYErBjQk0QiZUHmkCKcbtwTOVcGGLxQRgKY5UlFrn6iXI8Pdeyq3jQmle:24ew2+djLRHmBKc+QRdY5Wn1I8WQmltQ

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      plugin-deploy.jar

    • Size

      213KB

    • MD5

      e70723b8f6c4c7c09a6019733022cf53

    • SHA1

      e3ca32166c65e4dc73c21347ab22d54a7b5a9a83

    • SHA256

      32d35cd80b0302e3fcdd7349b4ff9a7b689ce080435109607ff79a834ff710d5

    • SHA512

      461c0499193c5ef5aa4e2e5d358031e7d28c98c8e1e38d22b710271bf3b561c28232bfaadbc2c275357e31b7b0ad6bca798008328ac3cff3701c1c9cca2ddddd

    • SSDEEP

      6144:zIojh8YSG6e3Q7RZddAOKofd3yugpauc79lPcJJ6:Uoj2Ytg7RXdJfRyuVuCoJo

    Score
    1/10

MITRE ATT&CK Matrix

Tasks