General

  • Target

    505ba33f59d309fb0a54a21abaa8c66da9a9b09896610ca83b1f9bf8b07dd0da

  • Size

    20.0MB

  • Sample

    231223-ve19saabcm

  • MD5

    a5c0e33494dc3140ad2bf8df2e3f9555

  • SHA1

    29c81149ab195bf8118c2e1c3eee5c83ce05fe8b

  • SHA256

    505ba33f59d309fb0a54a21abaa8c66da9a9b09896610ca83b1f9bf8b07dd0da

  • SHA512

    9ec9b48503961dc0afc2f7e09781abfc7d3729156f7fc98f88f34ac1ec87c95435419f74ce2a080477ccef6b0b03a85649836f1f61b7210091656d6476f71de2

  • SSDEEP

    393216:5ggcQcfg3h0QDPl1MXvGmbpmGsqtZwn/sHH1RIgJwJ9LP1jgHCgVvm+YHg0beM04:8PYDPY/GemJqDwn/sHHnaNjgHCgVO+TW

Score
8/10

Malware Config

Targets

    • Target

      505ba33f59d309fb0a54a21abaa8c66da9a9b09896610ca83b1f9bf8b07dd0da

    • Size

      20.0MB

    • MD5

      a5c0e33494dc3140ad2bf8df2e3f9555

    • SHA1

      29c81149ab195bf8118c2e1c3eee5c83ce05fe8b

    • SHA256

      505ba33f59d309fb0a54a21abaa8c66da9a9b09896610ca83b1f9bf8b07dd0da

    • SHA512

      9ec9b48503961dc0afc2f7e09781abfc7d3729156f7fc98f88f34ac1ec87c95435419f74ce2a080477ccef6b0b03a85649836f1f61b7210091656d6476f71de2

    • SSDEEP

      393216:5ggcQcfg3h0QDPl1MXvGmbpmGsqtZwn/sHH1RIgJwJ9LP1jgHCgVvm+YHg0beM04:8PYDPY/GemJqDwn/sHHnaNjgHCgVO+TW

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks