General

  • Target

    2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33

  • Size

    9.6MB

  • Sample

    231223-rpd1fsdecn

  • MD5

    e8ec71f418d6e189233f19baabbc9fd4

  • SHA1

    fd55fec1f5972dac3cc2d0dd50fd2ca87316fc76

  • SHA256

    2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33

  • SHA512

    f3281fd08490bba4bf446702f1511ee1a5e4e8cf2d45cc4a6c212eaf2932d0ae7302027efa32446e662fe7c5224f21e02817710b7214810061fa63e1b14aed8a

  • SSDEEP

    196608:QjDQX6l/1QlY0ellHSb8LiqQyz4Q0IIDukLikMnBTyKiAIsv0:QjDQqh2lTellHSb8LoYILLinnBh/Isv0

Score
10/10

Malware Config

Targets

    • Target

      2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33

    • Size

      9.6MB

    • MD5

      e8ec71f418d6e189233f19baabbc9fd4

    • SHA1

      fd55fec1f5972dac3cc2d0dd50fd2ca87316fc76

    • SHA256

      2df590eff5e47e728227a9acb998381a15538cb0a3bbb2d80ee1bf639dfcab33

    • SHA512

      f3281fd08490bba4bf446702f1511ee1a5e4e8cf2d45cc4a6c212eaf2932d0ae7302027efa32446e662fe7c5224f21e02817710b7214810061fa63e1b14aed8a

    • SSDEEP

      196608:QjDQX6l/1QlY0ellHSb8LiqQyz4Q0IIDukLikMnBTyKiAIsv0:QjDQqh2lTellHSb8LoYILLinnBh/Isv0

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks