General

  • Target

    3f94884db79afad2b84d96263db503c364c2c435d8ae9ba29692da67a82ac9b9

  • Size

    2.9MB

  • Sample

    231223-s17btaaac6

  • MD5

    f03f9744840b7fb173fe583113cd40cb

  • SHA1

    12d289fff5bc91d43b6faff6729313a066773fb2

  • SHA256

    3f94884db79afad2b84d96263db503c364c2c435d8ae9ba29692da67a82ac9b9

  • SHA512

    26edb402e6dbd6f6a7d08d43db35f74c1402df4e8a46ca5f1b9ac579af91f08a136d1796cfc0cf0c03e69108dc88be905f7627f1bae8f4d5c405f9d728c404d8

  • SSDEEP

    49152:TZRC65+2I/qCdu9UxpCNEPXWzEzDGvFjwmt/5h1sFJLUKEFl5Qo3Gm:TZc60T/5dD0NJmDGvNt/5hOFJnil5P2m

Score
8/10

Malware Config

Targets

    • Target

      3f94884db79afad2b84d96263db503c364c2c435d8ae9ba29692da67a82ac9b9

    • Size

      2.9MB

    • MD5

      f03f9744840b7fb173fe583113cd40cb

    • SHA1

      12d289fff5bc91d43b6faff6729313a066773fb2

    • SHA256

      3f94884db79afad2b84d96263db503c364c2c435d8ae9ba29692da67a82ac9b9

    • SHA512

      26edb402e6dbd6f6a7d08d43db35f74c1402df4e8a46ca5f1b9ac579af91f08a136d1796cfc0cf0c03e69108dc88be905f7627f1bae8f4d5c405f9d728c404d8

    • SSDEEP

      49152:TZRC65+2I/qCdu9UxpCNEPXWzEzDGvFjwmt/5h1sFJLUKEFl5Qo3Gm:TZc60T/5dD0NJmDGvNt/5hOFJnil5P2m

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks