General

  • Target

    40f5825be9055f114138aaec93264fdb4fe7758cb50c54415d236f21937d16c0

  • Size

    7.3MB

  • Sample

    231223-s52l5aaca8

  • MD5

    13e5204dd9da15b3319a593e5d566b9d

  • SHA1

    afe695d566c1ef1ada85811f2b010d5fd71cae42

  • SHA256

    40f5825be9055f114138aaec93264fdb4fe7758cb50c54415d236f21937d16c0

  • SHA512

    4e3e0dc284d561eaf9699aa5408105e785ef990f49cc076475a8afdad49074736235844b43d7a7b3be665de8ab98babc522917b5c0401d6b9d4945f020b5a371

  • SSDEEP

    196608:hfdlSgziU3pAe+Z89ejl7JymTqpdhiU1rrsOMgXjdX:h2GiU3pAe+ZZR7sLdhtrsX6

Score
10/10

Malware Config

Targets

    • Target

      40f5825be9055f114138aaec93264fdb4fe7758cb50c54415d236f21937d16c0

    • Size

      7.3MB

    • MD5

      13e5204dd9da15b3319a593e5d566b9d

    • SHA1

      afe695d566c1ef1ada85811f2b010d5fd71cae42

    • SHA256

      40f5825be9055f114138aaec93264fdb4fe7758cb50c54415d236f21937d16c0

    • SHA512

      4e3e0dc284d561eaf9699aa5408105e785ef990f49cc076475a8afdad49074736235844b43d7a7b3be665de8ab98babc522917b5c0401d6b9d4945f020b5a371

    • SSDEEP

      196608:hfdlSgziU3pAe+Z89ejl7JymTqpdhiU1rrsOMgXjdX:h2GiU3pAe+ZZR7sLdhtrsX6

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks