General

  • Target

    49da71be8dd4a3cd3e3c9bf7bb06bcee94eb408e7ac88e386969ffb2b824b0ba

  • Size

    16.7MB

  • Sample

    231223-tya19shbgp

  • MD5

    fa01f5a83797076ecd87d6e8c92278e1

  • SHA1

    5027c506a3afcbd4ca7d54252a36e0c5c7a3ae76

  • SHA256

    49da71be8dd4a3cd3e3c9bf7bb06bcee94eb408e7ac88e386969ffb2b824b0ba

  • SHA512

    a7c2d31dd4d1aad25f92b114b19737d44be4bcf6c11dd117997a44b5f070699fd306af8f8eaafb781e1c817952f267470faa512a235eac9778d70a8917841911

  • SSDEEP

    393216:UQmGHQ+ibVd+e37HFzHZnU+51cmE9dl2aG4a8Umr447AVm:UKHjipBpZn751cnPG4DHH

Score
7/10

Malware Config

Targets

    • Target

      49da71be8dd4a3cd3e3c9bf7bb06bcee94eb408e7ac88e386969ffb2b824b0ba

    • Size

      16.7MB

    • MD5

      fa01f5a83797076ecd87d6e8c92278e1

    • SHA1

      5027c506a3afcbd4ca7d54252a36e0c5c7a3ae76

    • SHA256

      49da71be8dd4a3cd3e3c9bf7bb06bcee94eb408e7ac88e386969ffb2b824b0ba

    • SHA512

      a7c2d31dd4d1aad25f92b114b19737d44be4bcf6c11dd117997a44b5f070699fd306af8f8eaafb781e1c817952f267470faa512a235eac9778d70a8917841911

    • SSDEEP

      393216:UQmGHQ+ibVd+e37HFzHZnU+51cmE9dl2aG4a8Umr447AVm:UKHjipBpZn751cnPG4DHH

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks