General

  • Target

    48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3

  • Size

    22.9MB

  • Sample

    231223-twdpdahbbk

  • MD5

    4427c73ab06ca8e263443d1688ee6d87

  • SHA1

    bb6ff23b7576161b4e3160dd9e0ea379a224cfca

  • SHA256

    48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3

  • SHA512

    55bf393a9b8f0e200eac86b8702c1ad186111be0b4a1156e5d4e65a44b6802be17324c43908d1b315dd4dffc55b70a9cb2897d9117ff41c5de99fbf84f216c43

  • SSDEEP

    393216:G/9xm2h9ldyrBoQzWmDTryQJ+0cA7UsaRG0ILo3ki3pnfgVuqLKBTCp6:a9j27N0IeDqLm

Score
8/10

Malware Config

Targets

    • Target

      48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3

    • Size

      22.9MB

    • MD5

      4427c73ab06ca8e263443d1688ee6d87

    • SHA1

      bb6ff23b7576161b4e3160dd9e0ea379a224cfca

    • SHA256

      48f74f408809a75d1cb18588e249ef3d7cce23eb7d442f23a23658b7201081f3

    • SHA512

      55bf393a9b8f0e200eac86b8702c1ad186111be0b4a1156e5d4e65a44b6802be17324c43908d1b315dd4dffc55b70a9cb2897d9117ff41c5de99fbf84f216c43

    • SSDEEP

      393216:G/9xm2h9ldyrBoQzWmDTryQJ+0cA7UsaRG0ILo3ki3pnfgVuqLKBTCp6:a9j27N0IeDqLm

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks