General

  • Target

    4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042

  • Size

    13.9MB

  • Sample

    231223-terjxaagb4

  • MD5

    b8cec37dc02a6177bca0dd4669b1ac69

  • SHA1

    7486ad52b8bed2ce4442eb69c730730598e34850

  • SHA256

    4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042

  • SHA512

    024e9bdff3dbf69c3f27e845af0a07deb5113140bb17a1bfe79dfb932f57d29dc7c2db30e4626f5a0c5044eb1d268d8a67754994fe151fcdf9cf8d5158c7a714

  • SSDEEP

    393216:2OG2ENl4aSppIQ4y9QpUHJwIanMDzovysphT:vijS+Q4yrHJwIEizoaUT

Score
7/10

Malware Config

Targets

    • Target

      4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042

    • Size

      13.9MB

    • MD5

      b8cec37dc02a6177bca0dd4669b1ac69

    • SHA1

      7486ad52b8bed2ce4442eb69c730730598e34850

    • SHA256

      4434a44e8354f25abdec8c38054c5e1f52abb5b8fd4c1e4d31e8b2573e19e042

    • SHA512

      024e9bdff3dbf69c3f27e845af0a07deb5113140bb17a1bfe79dfb932f57d29dc7c2db30e4626f5a0c5044eb1d268d8a67754994fe151fcdf9cf8d5158c7a714

    • SSDEEP

      393216:2OG2ENl4aSppIQ4y9QpUHJwIanMDzovysphT:vijS+Q4yrHJwIEizoaUT

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Target

      gdtadv2.jar

    • Size

      636KB

    • MD5

      cf57d4f9f2ccd86816c4f02989252423

    • SHA1

      6978f24478ba9baa004bf4d21db251fe67957ec2

    • SHA256

      e6df28c535e661d33a134407674c32555fb985a6a8f3bf8ec743150db61fa7ec

    • SHA512

      f759aea4c4fb91ce69f8238bd0e7c0f99b826cad04fc9c5f47c5afde2eceaf71d515d00f0e08b73c169e1a8bd21a17ddd3971bae27ddeb6960daaf5c5d719d4b

    • SSDEEP

      12288:lsocNwAPog24tsNbfevYHzN953QZlo5M0f+DMpP7x07S232vjUG:MNvPA9oYHzN953QEM0npDx0nm

    Score
    1/10

MITRE ATT&CK Matrix

Tasks