General

  • Target

    457bc9606963f54f6edd0960a10dde2728e6c4069172a794b0c19c0b6164bd90

  • Size

    25.7MB

  • Sample

    231223-tj4p2agfck

  • MD5

    23e872632b290d296458292aac8f611a

  • SHA1

    c09bedfe2f38445e29154e3cc6880730db7d82e6

  • SHA256

    457bc9606963f54f6edd0960a10dde2728e6c4069172a794b0c19c0b6164bd90

  • SHA512

    04ff38b6c3b760176b157ff617ed4f3c5279913f53ba3a4894bec9f54d0e55fd7159a82df900178fb1e9412d99f159b5572d9b526f2655c614d1a913fba6fa51

  • SSDEEP

    786432:A5Js5dzmCwcGMajFv9nEMxLk1/D4KAAwxmATtK:IGXmRNMajpCukp4xtK

Score
8/10

Malware Config

Targets

    • Target

      457bc9606963f54f6edd0960a10dde2728e6c4069172a794b0c19c0b6164bd90

    • Size

      25.7MB

    • MD5

      23e872632b290d296458292aac8f611a

    • SHA1

      c09bedfe2f38445e29154e3cc6880730db7d82e6

    • SHA256

      457bc9606963f54f6edd0960a10dde2728e6c4069172a794b0c19c0b6164bd90

    • SHA512

      04ff38b6c3b760176b157ff617ed4f3c5279913f53ba3a4894bec9f54d0e55fd7159a82df900178fb1e9412d99f159b5572d9b526f2655c614d1a913fba6fa51

    • SSDEEP

      786432:A5Js5dzmCwcGMajFv9nEMxLk1/D4KAAwxmATtK:IGXmRNMajpCukp4xtK

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks