General

  • Target

    344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47

  • Size

    9.5MB

  • Sample

    231223-r5p3naecgm

  • MD5

    653b1e0bbfef45cc50deaa7038dd33a6

  • SHA1

    1291641f9b2ac5d27ab4f753b7a491674a0a0bed

  • SHA256

    344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47

  • SHA512

    f0ba0e4bff6f00313c502892963da338a50727506e99d7060a30b57fdd03a92d76d12e0171b44e3fec39d0accf3fa0d77938e8aebf345ce67f9f28c56c6b0de8

  • SSDEEP

    196608:smnMsXrXE+bBcQY5zNU3pAeQwM55B+VWvRdqdzRjgNdhiU1rrsOMgXj9:smnMsbXitNU3pAeQwW5BPMCNdhtrsXu

Score
10/10

Malware Config

Targets

    • Target

      344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47

    • Size

      9.5MB

    • MD5

      653b1e0bbfef45cc50deaa7038dd33a6

    • SHA1

      1291641f9b2ac5d27ab4f753b7a491674a0a0bed

    • SHA256

      344fa1153663772a443d1bcc5930fa0b6e56e46346704acd51eb8b97eb43de47

    • SHA512

      f0ba0e4bff6f00313c502892963da338a50727506e99d7060a30b57fdd03a92d76d12e0171b44e3fec39d0accf3fa0d77938e8aebf345ce67f9f28c56c6b0de8

    • SSDEEP

      196608:smnMsXrXE+bBcQY5zNU3pAeQwM55B+VWvRdqdzRjgNdhiU1rrsOMgXj9:smnMsbXitNU3pAeQwW5BPMCNdhtrsXu

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks