General

  • Target

    46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a

  • Size

    14.5MB

  • Sample

    231223-tpq15agghp

  • MD5

    23c81a9e403eee3421cd19e9fdec3a6b

  • SHA1

    087687f936a99f4f2965bf59a1df076807d0ec08

  • SHA256

    46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a

  • SHA512

    5c02b61899e06775e9d5131c373ec9246ea112f6faec568d866ea4261c7469a36b90aef7184bb78ce9b3ddb8f112cc4e004e419c94d837e42b0c9824fdf0a1c6

  • SSDEEP

    196608:l8tpNrIxRoOeJVrDiryGzS+u5sRNz6k46Zd/Q8qQc2Ple7h0AeUxotyjhzQ74JLE:0KeDivUet/QQc2NAOXUxayF8742cL+d

Score
7/10

Malware Config

Targets

    • Target

      46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a

    • Size

      14.5MB

    • MD5

      23c81a9e403eee3421cd19e9fdec3a6b

    • SHA1

      087687f936a99f4f2965bf59a1df076807d0ec08

    • SHA256

      46e1a9b2e22e62d75078b37672b5b546f570b8406e23fe4946a304b03f036e6a

    • SHA512

      5c02b61899e06775e9d5131c373ec9246ea112f6faec568d866ea4261c7469a36b90aef7184bb78ce9b3ddb8f112cc4e004e419c94d837e42b0c9824fdf0a1c6

    • SSDEEP

      196608:l8tpNrIxRoOeJVrDiryGzS+u5sRNz6k46Zd/Q8qQc2Ple7h0AeUxotyjhzQ74JLE:0KeDivUet/QQc2NAOXUxayF8742cL+d

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Matrix

Tasks