General

  • Target

    2f9871e446cd0d731d0e4cd1a94bdba97669ec8c2cc656451bae62d2d2133a80

  • Size

    8.2MB

  • Sample

    231223-rsyt2adfgr

  • MD5

    c4c04254e03f338ef5d69bb1b8638764

  • SHA1

    5a9a5316eafb4ffb928b33fa8b826e417b697302

  • SHA256

    2f9871e446cd0d731d0e4cd1a94bdba97669ec8c2cc656451bae62d2d2133a80

  • SHA512

    a02c4ff6dd7e8606ba2d5ac74421b07aec18c05ff4f0b60c0cf93f19100023600bd2aa8811517d1f49badecccc6f9278e3ed4deae43567024830c1d36e0f21cd

  • SSDEEP

    196608:1E8HZtNPdmozgZU3pAePQwiHWQcgjNPdhiU1rrsOMgXj8:1rHZtNPddgZU3pAePQjHb5NPdhtrsX3

Score
10/10

Malware Config

Targets

    • Target

      2f9871e446cd0d731d0e4cd1a94bdba97669ec8c2cc656451bae62d2d2133a80

    • Size

      8.2MB

    • MD5

      c4c04254e03f338ef5d69bb1b8638764

    • SHA1

      5a9a5316eafb4ffb928b33fa8b826e417b697302

    • SHA256

      2f9871e446cd0d731d0e4cd1a94bdba97669ec8c2cc656451bae62d2d2133a80

    • SHA512

      a02c4ff6dd7e8606ba2d5ac74421b07aec18c05ff4f0b60c0cf93f19100023600bd2aa8811517d1f49badecccc6f9278e3ed4deae43567024830c1d36e0f21cd

    • SSDEEP

      196608:1E8HZtNPdmozgZU3pAePQwiHWQcgjNPdhiU1rrsOMgXj8:1rHZtNPddgZU3pAePQjHb5NPdhtrsX3

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks