General

  • Target

    3830fe6a703c460f053c7030e1ef212d5642de6510c776a15fd74760e7cafaec

  • Size

    4.4MB

  • Sample

    231223-sd17aahah2

  • MD5

    c2948b88c2dc543af26ca82ff32b2043

  • SHA1

    75253abf89423294339572d1ad3644abc817b93f

  • SHA256

    3830fe6a703c460f053c7030e1ef212d5642de6510c776a15fd74760e7cafaec

  • SHA512

    2d0bb8ad7dd7242c8df479d6f71f5d193d621be959987d606d002996e9275ed7905ebbf51f05e315290177ffa682b8c325703bcef4ee230b6ab30fc699385795

  • SSDEEP

    98304:Y/amqNu8oO/Hl15ILYLmLU40XKav2mvfBXvhsw6C6BZvuSUpC:ua1Q8oGHT5iYLmozXYUfJvggSUw

Malware Config

Targets

    • Target

      3830fe6a703c460f053c7030e1ef212d5642de6510c776a15fd74760e7cafaec

    • Size

      4.4MB

    • MD5

      c2948b88c2dc543af26ca82ff32b2043

    • SHA1

      75253abf89423294339572d1ad3644abc817b93f

    • SHA256

      3830fe6a703c460f053c7030e1ef212d5642de6510c776a15fd74760e7cafaec

    • SHA512

      2d0bb8ad7dd7242c8df479d6f71f5d193d621be959987d606d002996e9275ed7905ebbf51f05e315290177ffa682b8c325703bcef4ee230b6ab30fc699385795

    • SSDEEP

      98304:Y/amqNu8oO/Hl15ILYLmLU40XKav2mvfBXvhsw6C6BZvuSUpC:ua1Q8oGHT5iYLmozXYUfJvggSUw

    Score
    8/10
    • Removes its main activity from the application launcher

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Tries to add a device administrator.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks