General

  • Target

    534649bbacfa34bca543fab0d5b95e18b014002f85cc25f1caf1fe65eb3465d5

  • Size

    24.7MB

  • Sample

    231223-vnhh2acgd4

  • MD5

    a0a403d0d4f6142cc224cba9de638822

  • SHA1

    1f39b8953f7511d7aef51a9a4b50b4bc4e551afe

  • SHA256

    534649bbacfa34bca543fab0d5b95e18b014002f85cc25f1caf1fe65eb3465d5

  • SHA512

    3b4b516209b80b93262b9e85a7689fbe0b8a9884306231ca4259c2c71d5d144048e0f84d6846d94cb7881c634485ce66eaf8893a039cb02c9bc7cd663c3937d4

  • SSDEEP

    393216:1wZdCYDaaqjvBaw0LDIQYeUPA8HKJw/6s8rHTpZqQWiByz20TwYV9Pnx/:1XutnGen8qa8TTpZqXiBo20TwYJ

Score
8/10

Malware Config

Targets

    • Target

      534649bbacfa34bca543fab0d5b95e18b014002f85cc25f1caf1fe65eb3465d5

    • Size

      24.7MB

    • MD5

      a0a403d0d4f6142cc224cba9de638822

    • SHA1

      1f39b8953f7511d7aef51a9a4b50b4bc4e551afe

    • SHA256

      534649bbacfa34bca543fab0d5b95e18b014002f85cc25f1caf1fe65eb3465d5

    • SHA512

      3b4b516209b80b93262b9e85a7689fbe0b8a9884306231ca4259c2c71d5d144048e0f84d6846d94cb7881c634485ce66eaf8893a039cb02c9bc7cd663c3937d4

    • SSDEEP

      393216:1wZdCYDaaqjvBaw0LDIQYeUPA8HKJw/6s8rHTpZqQWiByz20TwYV9Pnx/:1XutnGen8qa8TTpZqXiBo20TwYJ

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks