General

  • Target

    50fc37e9d42145ccf211c876654d21deaef6dc441ff3986f7ef0fcd3efb3c1b9

  • Size

    20.3MB

  • Sample

    231223-vglxwaabgk

  • MD5

    95768f246b88ff42f80a3230c03bccc3

  • SHA1

    7da5ac1b3c39ec2711afccf261413723d9074296

  • SHA256

    50fc37e9d42145ccf211c876654d21deaef6dc441ff3986f7ef0fcd3efb3c1b9

  • SHA512

    dea5f3eee6a66e7b7932a3886c32c8c9d3db9e47b1c35016ef349190df8bb1a54e7b433ef041d55423410a969e9ae9f30d8a93fbd87252590373b6e81dd22127

  • SSDEEP

    393216:xn6BZHDkpa7w5uNu+nnvgvmKmU3aD0VYQ1fmYwb3TFOTS3bnuHyBX1oggpQ9c7aN:xIDzNu+nnvgvmK9u0VYQ1fmYwZSulogv

Score
7/10

Malware Config

Targets

    • Target

      50fc37e9d42145ccf211c876654d21deaef6dc441ff3986f7ef0fcd3efb3c1b9

    • Size

      20.3MB

    • MD5

      95768f246b88ff42f80a3230c03bccc3

    • SHA1

      7da5ac1b3c39ec2711afccf261413723d9074296

    • SHA256

      50fc37e9d42145ccf211c876654d21deaef6dc441ff3986f7ef0fcd3efb3c1b9

    • SHA512

      dea5f3eee6a66e7b7932a3886c32c8c9d3db9e47b1c35016ef349190df8bb1a54e7b433ef041d55423410a969e9ae9f30d8a93fbd87252590373b6e81dd22127

    • SSDEEP

      393216:xn6BZHDkpa7w5uNu+nnvgvmKmU3aD0VYQ1fmYwb3TFOTS3bnuHyBX1oggpQ9c7aN:xIDzNu+nnvgvmK9u0VYQ1fmYwZSulogv

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      PlayerUIApk.apk

    • Size

      120KB

    • MD5

      b6efedbe01c85955be3d81ac826c5395

    • SHA1

      9a7548257c3b00930f598d466233916b52ca6235

    • SHA256

      a79cc67c556e99d0da12d0dd7239f92d1a6b98998ce5d962fdeca047ecb904e9

    • SHA512

      ee65a1e42c42375976b99df0739891ece4e3783cad6215b2099fa0d5685100123c0f6416a9b9fac65f8703f3294c62d662a31938997cf7ce82ed53e6144500bd

    • SSDEEP

      3072:PAW2yF5i61JUew8UOYgB2M3jn+DsEb32mk90wNLV:hjiEVUOmM3z+N7k906

    Score
    1/10
    • Target

      bdxadsdk.jar

    • Size

      84KB

    • MD5

      15cf2b18a418ed61950abcbe7b97d17f

    • SHA1

      65f19f2f31da78769fa3d5e22ed23a903b27449a

    • SHA256

      40289ee4823f569e311598cfdc814028e15723f9dfbe86483cc6c0e36336f494

    • SHA512

      cff777d140d2895159727571ea1d6a7f6966f1838183f6915f4c78613f3054d642aafc80e6bc39e3e2a5385f1596d397b35bbcf2d83cc5dd078bfa7ca18b5f8d

    • SSDEEP

      1536:Yg6m4Wcz+CrqAnJhnH2v8c5UzwzbWtEp+H4q8ufsq0P/zOwaCcT:YLm4WprAzHR0XWrl8Ks9PrOZC6

    Score
    1/10
    • Target

      duoduom_10.jpg

    • Size

      419KB

    • MD5

      5576316130a5009e47b1d58bcfc1762c

    • SHA1

      cc080ddade11ada542d9db682a7c3202f50d4bdf

    • SHA256

      37da2a54b259047a7437c345f9dfe3b23df848ee652f56ac737bbe6ecac01967

    • SHA512

      73616fff468123ca21b229a07a1e393112fb952eac8542f204b3f54087523e53221f1fd9b3be4437ae5383067455f457264ca29de7604e6d0d0f25bc0be61a87

    • SSDEEP

      6144:JqyoXfiIy/csZb+gbLiLtPKYdhPqHl3CVz2Rh99kcJc3S8jiu9yBUU:JSXfiIyp+1YohPel3GAJkVQu9yB7

    Score
    1/10
    • Target

      bdxadsdk.jar

    • Size

      85KB

    • MD5

      8a7616b8aa949a9c4f56646343fafccd

    • SHA1

      e0653e2cada88ea552f04157916b2d458ea70ab0

    • SHA256

      68bc2ffef6fa34c7e82d4a52a5f7f173cc2206d4b2f22b6b8a6e23d06dd82755

    • SHA512

      159dfcaa317157864ba66e74161a7b7a35fc598544009222a7fd5e1ba9e5cbb4ac62c35491201f692b79c13b033a0a3e83577dc1468f28feeced569f306e47f1

    • SSDEEP

      1536:gTGsje/aPIZJnkah4IFGMd8pAImy3G/ckDaAhUrabvW9LRIpSZ:gTGsi/awYqCqIy/csmrab+9LRIEZ

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      101KB

    • MD5

      9dc038f6ad17e85ef978f93344107f42

    • SHA1

      d33d8adde7af312593c2ccea7664083d8b1b41b5

    • SHA256

      6bd8965f30b4cf6388ed2aa86fe3b1badf26ac988cab02c8941c588f1753a5f2

    • SHA512

      964173a865cfa82937fed3d8601b4ab04a264ba55e7895f0ef2b330c37fd957897b9e1ad4147472671fcee42ad24986914785b1161dcbd5a6fb2e339f6ab4a57

    • SSDEEP

      1536:7deZ+UNUMn+/mr1SfFPaGM/7/K5flHM3Ixaj1J4OExIbYeagkCC+heUGEzkECL1D:7w+QUe+81SaGSKs3TPZEHeP15GTf27s

    Score
    1/10

MITRE ATT&CK Matrix

Tasks