General

  • Target

    21a0120b0b633d67e0337e4710e10697fd27cc6b8dd418503034fc9df8cecc4f

  • Size

    18.9MB

  • Sample

    231223-qtgfpsbgck

  • MD5

    b3663e5d7a1650a0610edf1a74cd2e45

  • SHA1

    278ee8988c453a596587ae136da1f1c96d667f2b

  • SHA256

    21a0120b0b633d67e0337e4710e10697fd27cc6b8dd418503034fc9df8cecc4f

  • SHA512

    7c3a396ccf8a196551eb0431d4036f34cf642944c541c0aacc104c8b7534a165e07581b0608062edfb2852e9e05a24144de48a2e7416ad75dd93a9e458c57c17

  • SSDEEP

    393216:zs4ObMivwcGGl5NpDgZ4HWGTmbmrNwVyw8BxQvm:zs4pivwcGA5Nt242GSaBbwm

Score
7/10

Malware Config

Targets

    • Target

      21a0120b0b633d67e0337e4710e10697fd27cc6b8dd418503034fc9df8cecc4f

    • Size

      18.9MB

    • MD5

      b3663e5d7a1650a0610edf1a74cd2e45

    • SHA1

      278ee8988c453a596587ae136da1f1c96d667f2b

    • SHA256

      21a0120b0b633d67e0337e4710e10697fd27cc6b8dd418503034fc9df8cecc4f

    • SHA512

      7c3a396ccf8a196551eb0431d4036f34cf642944c541c0aacc104c8b7534a165e07581b0608062edfb2852e9e05a24144de48a2e7416ad75dd93a9e458c57c17

    • SSDEEP

      393216:zs4ObMivwcGGl5NpDgZ4HWGTmbmrNwVyw8BxQvm:zs4pivwcGA5Nt242GSaBbwm

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks