General

  • Target

    21c6861ea6cfaa964cb59dd3c3cf195c3bd18401824a80fdfdc9912bdb4d8b53

  • Size

    8.3MB

  • Sample

    231223-qt2rmsbgdr

  • MD5

    0e75b28d9f0f96128a9d4358cb2dc5ca

  • SHA1

    a1b8588d621aa8657b53aaa4e52538fa430910b6

  • SHA256

    21c6861ea6cfaa964cb59dd3c3cf195c3bd18401824a80fdfdc9912bdb4d8b53

  • SHA512

    4c480052c9985c17a8c13eb84adb7e056aaac9ba5e709ea67f2e60e38254adb7b4ff5255c8cfc97f1ce3d2ecc62a90f0503ba0f045361f36384e6d212516309e

  • SSDEEP

    196608:PvDK0+nGVxpHzkU3pAepOnBZ86rIyBzudhiU1rrsOMgXjo/:eXGVHTkU3pAepOnBZ86rIkudhtrsXT

Score
10/10

Malware Config

Targets

    • Target

      21c6861ea6cfaa964cb59dd3c3cf195c3bd18401824a80fdfdc9912bdb4d8b53

    • Size

      8.3MB

    • MD5

      0e75b28d9f0f96128a9d4358cb2dc5ca

    • SHA1

      a1b8588d621aa8657b53aaa4e52538fa430910b6

    • SHA256

      21c6861ea6cfaa964cb59dd3c3cf195c3bd18401824a80fdfdc9912bdb4d8b53

    • SHA512

      4c480052c9985c17a8c13eb84adb7e056aaac9ba5e709ea67f2e60e38254adb7b4ff5255c8cfc97f1ce3d2ecc62a90f0503ba0f045361f36384e6d212516309e

    • SSDEEP

      196608:PvDK0+nGVxpHzkU3pAepOnBZ86rIyBzudhiU1rrsOMgXjo/:eXGVHTkU3pAepOnBZ86rIkudhtrsXT

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks