General

  • Target

    3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1

  • Size

    15.6MB

  • Sample

    231223-sh8f6ahcf3

  • MD5

    c4f68006ee772cc2b14b49e8916d7efc

  • SHA1

    d4580d48834f5be46fb1991fb89bb250e8a273d5

  • SHA256

    3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1

  • SHA512

    8d123465c19d6f4bc2e08af89436ffa581576be6e2b593c0681ccab582df5901a33500c7d17b447332012fd3b76ed78fda0bd01837cb90880168c89e4ad9da13

  • SSDEEP

    393216:+AEzLOfO+JC44LRp4SwoSiJQnZBevvUmuD:+mftSLRpXkiGZ6qD

Score
8/10

Malware Config

Targets

    • Target

      3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1

    • Size

      15.6MB

    • MD5

      c4f68006ee772cc2b14b49e8916d7efc

    • SHA1

      d4580d48834f5be46fb1991fb89bb250e8a273d5

    • SHA256

      3970bdd5b28357db03c2ad4b4e2baad1bb0e7c502947dde5a5018dcdbffce1c1

    • SHA512

      8d123465c19d6f4bc2e08af89436ffa581576be6e2b593c0681ccab582df5901a33500c7d17b447332012fd3b76ed78fda0bd01837cb90880168c89e4ad9da13

    • SSDEEP

      393216:+AEzLOfO+JC44LRp4SwoSiJQnZBevvUmuD:+mftSLRpXkiGZ6qD

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks