General

  • Target

    2a8cd91b315fc2d9afe16838456df0e12717b9cbb39de51a93db50681e52319e

  • Size

    26.6MB

  • Sample

    231223-rf46aafeb4

  • MD5

    0291fe29a8e9b471174bdee0f127d35d

  • SHA1

    02b4ee2562055706e453929403c53c3fe3823372

  • SHA256

    2a8cd91b315fc2d9afe16838456df0e12717b9cbb39de51a93db50681e52319e

  • SHA512

    6b176e9deb7feba8c94baffe5b180f5068bf698c129f49114eff1dd9d3b6d00256cf3799efc9efddd4b8d69db430480a2111de10b9a8d0e524432eed15c18eef

  • SSDEEP

    786432:cYKpNQgpE3g49wC7bh5ufw2jaHpRjhVgw:cYK3vwg49p15H2ajhVl

Score
8/10

Malware Config

Targets

    • Target

      2a8cd91b315fc2d9afe16838456df0e12717b9cbb39de51a93db50681e52319e

    • Size

      26.6MB

    • MD5

      0291fe29a8e9b471174bdee0f127d35d

    • SHA1

      02b4ee2562055706e453929403c53c3fe3823372

    • SHA256

      2a8cd91b315fc2d9afe16838456df0e12717b9cbb39de51a93db50681e52319e

    • SHA512

      6b176e9deb7feba8c94baffe5b180f5068bf698c129f49114eff1dd9d3b6d00256cf3799efc9efddd4b8d69db430480a2111de10b9a8d0e524432eed15c18eef

    • SSDEEP

      786432:cYKpNQgpE3g49wC7bh5ufw2jaHpRjhVgw:cYK3vwg49p15H2ajhVl

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks