General

  • Target

    38af68e1e634689d02469179ec840c2cfa0a8355f41ff41f98ba3eb52989d277

  • Size

    17.5MB

  • Sample

    231223-se7qfseghq

  • MD5

    1f1d7a0bc559fe9322607ea247b54aea

  • SHA1

    57ea4d274e5b166726e1d7e95f3dfce9a4bac111

  • SHA256

    38af68e1e634689d02469179ec840c2cfa0a8355f41ff41f98ba3eb52989d277

  • SHA512

    5991a55fc7e2aa7a71b979a019da5bee92b1de18615840233a180d194d66cb45d7884e611821c4c0a9e0ae52874db92563a9b47eed037679aac3ceadf5c7afa6

  • SSDEEP

    393216:OjGEK9GQFGCbja/g1lfgAQ43fpaRdaosDuZxqTYTp3q4OhFmQtTUhg:0K9GPCbUAb3fWdaNqqTMjEmDg

Malware Config

Targets

    • Target

      38af68e1e634689d02469179ec840c2cfa0a8355f41ff41f98ba3eb52989d277

    • Size

      17.5MB

    • MD5

      1f1d7a0bc559fe9322607ea247b54aea

    • SHA1

      57ea4d274e5b166726e1d7e95f3dfce9a4bac111

    • SHA256

      38af68e1e634689d02469179ec840c2cfa0a8355f41ff41f98ba3eb52989d277

    • SHA512

      5991a55fc7e2aa7a71b979a019da5bee92b1de18615840233a180d194d66cb45d7884e611821c4c0a9e0ae52874db92563a9b47eed037679aac3ceadf5c7afa6

    • SSDEEP

      393216:OjGEK9GQFGCbja/g1lfgAQ43fpaRdaosDuZxqTYTp3q4OhFmQtTUhg:0K9GPCbUAb3fWdaNqqTMjEmDg

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks