General

  • Target

    4359dee4ff675503e2ea95e367fb48c7e7808a768af4af3c136624bc6fdfb97f

  • Size

    14.1MB

  • Sample

    231223-tckzcagcdp

  • MD5

    723fffe134e2c008065b31751c30d4ac

  • SHA1

    285d918976d7a23e2e26a3c9f693650ee2d6b35f

  • SHA256

    4359dee4ff675503e2ea95e367fb48c7e7808a768af4af3c136624bc6fdfb97f

  • SHA512

    2e77a6cc5eb328671fce25fb8c709074b71b3cbe98d2f7f108ab6089d1e5f73474f69b31c6612374f871e6f425a6e59794c162c1ab2f7577481b5c3d3d9a15f7

  • SSDEEP

    393216:vflLjaqhoigZIoOL29A4Er1DxWwVOf9iScXPNaEYfojF2mcws5vdkGXj1hdQ+AX:FaZZIY9A4ExNWwVYiScXPNaEYfojF2m7

Score
7/10

Malware Config

Targets

    • Target

      4359dee4ff675503e2ea95e367fb48c7e7808a768af4af3c136624bc6fdfb97f

    • Size

      14.1MB

    • MD5

      723fffe134e2c008065b31751c30d4ac

    • SHA1

      285d918976d7a23e2e26a3c9f693650ee2d6b35f

    • SHA256

      4359dee4ff675503e2ea95e367fb48c7e7808a768af4af3c136624bc6fdfb97f

    • SHA512

      2e77a6cc5eb328671fce25fb8c709074b71b3cbe98d2f7f108ab6089d1e5f73474f69b31c6612374f871e6f425a6e59794c162c1ab2f7577481b5c3d3d9a15f7

    • SSDEEP

      393216:vflLjaqhoigZIoOL29A4Er1DxWwVOf9iScXPNaEYfojF2mcws5vdkGXj1hdQ+AX:FaZZIY9A4ExNWwVYiScXPNaEYfojF2m7

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks