General

  • Target

    3e1cac4feab2b10e72ca7e718aa59f3ac91dacccb85eed50bf9611b2b6038aab

  • Size

    16.6MB

  • Sample

    231223-sxkcwafefl

  • MD5

    4c69e0a3cf71b3924368e3cffddad8f2

  • SHA1

    851765026a6ce7b43905f594717c342484f5a24a

  • SHA256

    3e1cac4feab2b10e72ca7e718aa59f3ac91dacccb85eed50bf9611b2b6038aab

  • SHA512

    1f74149a6284ff0becea4df2fea6cb9f55a31e6b9d9e9fd92b291e328fea16d0fcafe1ef70dc384368a80096dd1d3b9700587d28a65f1fa31c231f0a74faf155

  • SSDEEP

    393216:Q5Gx0Q92WgVwWtbK1geozj2VL8bu59LwkeqrOiAQwE:QYnMWgJ5+gRTU9Y7ef

Score
8/10

Malware Config

Targets

    • Target

      3e1cac4feab2b10e72ca7e718aa59f3ac91dacccb85eed50bf9611b2b6038aab

    • Size

      16.6MB

    • MD5

      4c69e0a3cf71b3924368e3cffddad8f2

    • SHA1

      851765026a6ce7b43905f594717c342484f5a24a

    • SHA256

      3e1cac4feab2b10e72ca7e718aa59f3ac91dacccb85eed50bf9611b2b6038aab

    • SHA512

      1f74149a6284ff0becea4df2fea6cb9f55a31e6b9d9e9fd92b291e328fea16d0fcafe1ef70dc384368a80096dd1d3b9700587d28a65f1fa31c231f0a74faf155

    • SSDEEP

      393216:Q5Gx0Q92WgVwWtbK1geozj2VL8bu59LwkeqrOiAQwE:QYnMWgJ5+gRTU9Y7ef

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks