General

  • Target

    311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59

  • Size

    9.8MB

  • Sample

    231223-rww5lsgca4

  • MD5

    4892a230279c47c8c3f8503234110117

  • SHA1

    62e75c4949fdb1aaea145b39e4b75f89c0a4c452

  • SHA256

    311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59

  • SHA512

    e00e48b32eb6fdc6d78755221411d45c94f39969f939fee8c56f17ee8dfc44b4384c82e043f61c6191badc0d8ab368b1210180efb090af38b2027dff2579e19f

  • SSDEEP

    196608:+KLV20Bn81eD/zqBNIl2RfzDU3pAeSqSjOY7kT0C5F0dhiU1rrsOMgXjW:+K40qoDrqBNIl+bDU3pAe1IO+kT0kSdO

Score
10/10

Malware Config

Targets

    • Target

      311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59

    • Size

      9.8MB

    • MD5

      4892a230279c47c8c3f8503234110117

    • SHA1

      62e75c4949fdb1aaea145b39e4b75f89c0a4c452

    • SHA256

      311b174d92256dafdb276d9ae38af093788cf1986f6029f37e41a737d32fda59

    • SHA512

      e00e48b32eb6fdc6d78755221411d45c94f39969f939fee8c56f17ee8dfc44b4384c82e043f61c6191badc0d8ab368b1210180efb090af38b2027dff2579e19f

    • SSDEEP

      196608:+KLV20Bn81eD/zqBNIl2RfzDU3pAeSqSjOY7kT0C5F0dhiU1rrsOMgXjW:+K40qoDrqBNIl+bDU3pAe1IO+kT0kSdO

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks