General

  • Target

    4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2

  • Size

    21.9MB

  • Sample

    231223-t9avmscba3

  • MD5

    593a381742469239a037e2ef1fff7e5e

  • SHA1

    97a0019458aebb5a113f00b2e5e4ebf88df07fd1

  • SHA256

    4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2

  • SHA512

    0b69eb21b5a7efa9762e0938fcf58e32489263304dae564df20591a6b03ce667e1f3c71be7605a5cf66669681f45502c79d11d522c740faa8ca9020e99cc94e3

  • SSDEEP

    393216:yrEdxAMu1m9WDpuGzmlfyBlUR3o13X8DgRrOHBOwxcY5H/e4shut6/CToiBwDheC:M9m9Rimlf4lJ13XUe6Zc1bFqTt9C

Score
8/10

Malware Config

Targets

    • Target

      4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2

    • Size

      21.9MB

    • MD5

      593a381742469239a037e2ef1fff7e5e

    • SHA1

      97a0019458aebb5a113f00b2e5e4ebf88df07fd1

    • SHA256

      4e5ec46bc0dc7d0b82ba4943c08e330af71199774c6bd0ff748c9e1fc88b0db2

    • SHA512

      0b69eb21b5a7efa9762e0938fcf58e32489263304dae564df20591a6b03ce667e1f3c71be7605a5cf66669681f45502c79d11d522c740faa8ca9020e99cc94e3

    • SSDEEP

      393216:yrEdxAMu1m9WDpuGzmlfyBlUR3o13X8DgRrOHBOwxcY5H/e4shut6/CToiBwDheC:M9m9Rimlf4lJ13XUe6Zc1bFqTt9C

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks