General

  • Target

    33a5fe8a2d7ba22225bf7ff279fb639df80049fdbf02b17a4c4e4c4df3cd48c5

  • Size

    29.5MB

  • Sample

    231223-r3tytsgee2

  • MD5

    74659e2d8271e7bb1995c8828ee112d2

  • SHA1

    5de56bc9d22a7d4d19f8794727521303b7835c72

  • SHA256

    33a5fe8a2d7ba22225bf7ff279fb639df80049fdbf02b17a4c4e4c4df3cd48c5

  • SHA512

    71cf6ddb7f352df249d5514c7a0938b84e6f57996b94f04cba74a2688699ca0a203c24dc8c3c927bf6e856828716e0dbd6c048fc58c5560c186fdd7461faa2e2

  • SSDEEP

    393216:NXmEvGuIneOqaMgBM2sPDmbJE2ciq4pzn8yMXK6FKwECpBU+KKWqkGkKn8AxVWk:hQTMXPDUcmn8VK6FKvCpBU+BFkbNUWk

Score
8/10

Malware Config

Targets

    • Target

      33a5fe8a2d7ba22225bf7ff279fb639df80049fdbf02b17a4c4e4c4df3cd48c5

    • Size

      29.5MB

    • MD5

      74659e2d8271e7bb1995c8828ee112d2

    • SHA1

      5de56bc9d22a7d4d19f8794727521303b7835c72

    • SHA256

      33a5fe8a2d7ba22225bf7ff279fb639df80049fdbf02b17a4c4e4c4df3cd48c5

    • SHA512

      71cf6ddb7f352df249d5514c7a0938b84e6f57996b94f04cba74a2688699ca0a203c24dc8c3c927bf6e856828716e0dbd6c048fc58c5560c186fdd7461faa2e2

    • SSDEEP

      393216:NXmEvGuIneOqaMgBM2sPDmbJE2ciq4pzn8yMXK6FKwECpBU+KKWqkGkKn8AxVWk:hQTMXPDUcmn8VK6FKvCpBU+BFkbNUWk

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      bdxadsdk.jar

    • Size

      485KB

    • MD5

      3be5368946ad9cbe671430c7a098d82a

    • SHA1

      c7255fc28d0f148d36a7f1434c65a35fbcc56c86

    • SHA256

      5a2b63efa0438bd7be208ea920b55ef6963621bd5812764f11d4c8a3d9b2844b

    • SHA512

      6b2d7795683d1bffcaa0ee929371bbaf954f7c213e8a0246f2f65529ab01fc3a11897c16bc0c932e3b615ff6a7bcd8a54f3fe0f156a5d8ef39de83d5bb0be069

    • SSDEEP

      6144:BEmGAmxIj99SrSwWFwwaVGwLThKi6LfTGuPy81JVsI5FL03w7L0IzYtZXE0Q9Pfd:ePXo99DlOw61hKpJ9frsgHnq059PB77v

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      1.3MB

    • MD5

      afd1adf271f5d482bbae809c39e6b60e

    • SHA1

      b815636c66efae35cf8b8cd711902f8bac08cd65

    • SHA256

      cc1e050132ee064b47495b0fc69c7d2751140115fca76764e5270ddb7f471fd6

    • SHA512

      c2637939fe039d44382cc184d3e56b54a5e7eae73bdeec902bd89c0efb23586131080c1df6f6cc7d137574b340adc810bd51011e6950cd30736b0575d0f12a74

    • SSDEEP

      24576:D0VYduy7jpmivU2xcreogZ14jhVk61IvItlc4rOc1u/nd2ZO3Kbny:DR7jp3UAA57deOM/ndmWKby

    Score
    1/10

MITRE ATT&CK Matrix

Tasks