General

  • Target

    31b2f45a55756c896224cc9c6d100ce10b3ca807dea600a11994122f91c4fab9

  • Size

    9.9MB

  • Sample

    231223-rx9gbsgce4

  • MD5

    6547214e147af234ce3a144c950d551c

  • SHA1

    c46438f5c6934b3480d91ad36fa7a1290e0c2cab

  • SHA256

    31b2f45a55756c896224cc9c6d100ce10b3ca807dea600a11994122f91c4fab9

  • SHA512

    8b56573484d9d812d530ed88d0609b187d797fd28fd80ca459ff3d2aeb93333347403066d73aef34165dcaf935c48c0dd214ca47a3d0ce570471160be0374700

  • SSDEEP

    196608:47baKMQTTXADOUellHWVF8miqQczEBDS2M+1WLwcbD0ecTje8ewQ1NYvR:WTTX6ellHWVF8m6BM70cb5U68u7YvR

Score
10/10

Malware Config

Targets

    • Target

      31b2f45a55756c896224cc9c6d100ce10b3ca807dea600a11994122f91c4fab9

    • Size

      9.9MB

    • MD5

      6547214e147af234ce3a144c950d551c

    • SHA1

      c46438f5c6934b3480d91ad36fa7a1290e0c2cab

    • SHA256

      31b2f45a55756c896224cc9c6d100ce10b3ca807dea600a11994122f91c4fab9

    • SHA512

      8b56573484d9d812d530ed88d0609b187d797fd28fd80ca459ff3d2aeb93333347403066d73aef34165dcaf935c48c0dd214ca47a3d0ce570471160be0374700

    • SSDEEP

      196608:47baKMQTTXADOUellHWVF8miqQczEBDS2M+1WLwcbD0ecTje8ewQ1NYvR:WTTX6ellHWVF8m6BM70cb5U68u7YvR

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks