General

  • Target

    21e360d97c2290debbd1ba2ea4021c7a12c0b3daec225b938e453a06bbaa2faa

  • Size

    13.1MB

  • Sample

    231223-qvb8daecc8

  • MD5

    de4958d9d8f522a5c8f0a2f563ae7f43

  • SHA1

    7ad3eb0f55754bf1e0cc2eb09dead93949c241d6

  • SHA256

    21e360d97c2290debbd1ba2ea4021c7a12c0b3daec225b938e453a06bbaa2faa

  • SHA512

    86f1fe6eb7ba2eb7f59595eb9dbaab1cdeb8d110c1e6bb3a905b1bde05e3ca4dda06d91ce77beec4e83378fa6d2f820ed27940e13afcea718f18e1062d4009c0

  • SSDEEP

    196608:PLuvQLs78AFWUEvEoNCP8PZoZO3db9CtwZsT5HNBGQiRi3Z0IeK8w+DGfYnk8jgN:PwrZ+b9C95tBGQie8XGfYeer0

Score
8/10

Malware Config

Targets

    • Target

      21e360d97c2290debbd1ba2ea4021c7a12c0b3daec225b938e453a06bbaa2faa

    • Size

      13.1MB

    • MD5

      de4958d9d8f522a5c8f0a2f563ae7f43

    • SHA1

      7ad3eb0f55754bf1e0cc2eb09dead93949c241d6

    • SHA256

      21e360d97c2290debbd1ba2ea4021c7a12c0b3daec225b938e453a06bbaa2faa

    • SHA512

      86f1fe6eb7ba2eb7f59595eb9dbaab1cdeb8d110c1e6bb3a905b1bde05e3ca4dda06d91ce77beec4e83378fa6d2f820ed27940e13afcea718f18e1062d4009c0

    • SSDEEP

      196608:PLuvQLs78AFWUEvEoNCP8PZoZO3db9CtwZsT5HNBGQiRi3Z0IeK8w+DGfYnk8jgN:PwrZ+b9C95tBGQie8XGfYeer0

    Score
    6/10
    • Reads information about phone network operator.

    • Target

      AlipayMSP090_PPTV_V3.5.2.0424.apk

    • Size

      350KB

    • MD5

      4299fba05928ff389bbd58a235f74c86

    • SHA1

      c4ddad6c8872985bb2f50b94aa87046778034faa

    • SHA256

      a125388128d681bc47d00bdf2df30b20a12d187681db593c508126af472eda24

    • SHA512

      05c4c4b8072a718998072d5442efcb6ae817217478e3cd485e5d80c674d0081dc72561df7726985036746a7fe044153f8ec3faf9add3498bc49e3a71e650a112

    • SSDEEP

      6144:QfJiREH0/sEGId2fuRmlxLwEd0r2sfS4QlV7G8v9oKvFuQL2bBV2fnbJk:QfJisFEGc2yms5a4QlV7G8Ge62fnbu

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

MITRE ATT&CK Matrix

Tasks