General

  • Target

    55f27dccaccf32c0008fcf8ac2921c76c049d31645230e52afce25bd0aaa77b3

  • Size

    8.9MB

  • Sample

    231223-vwpbjsahdj

  • MD5

    317ddee75661828911724226b90d72be

  • SHA1

    d15c5795eb8c5dfb07dbf0e024b843b9c8eed3a2

  • SHA256

    55f27dccaccf32c0008fcf8ac2921c76c049d31645230e52afce25bd0aaa77b3

  • SHA512

    e5d2807e00840d5f847da9135343eaf6e8f0b54ac398247ca1f264cdc89a992a1117d3681314b2c1e449fa675ec94e2b7dd812264c9cd75ab2587c6ad98d30de

  • SSDEEP

    196608:NmfRW/tss5R3xmzOP6cRv2jOzIb1+CToWKQDDE/JDRABS5Ol0:4qDxmzOCcYqe4WNDDCJDRABuOl0

Score
8/10

Malware Config

Targets

    • Target

      55f27dccaccf32c0008fcf8ac2921c76c049d31645230e52afce25bd0aaa77b3

    • Size

      8.9MB

    • MD5

      317ddee75661828911724226b90d72be

    • SHA1

      d15c5795eb8c5dfb07dbf0e024b843b9c8eed3a2

    • SHA256

      55f27dccaccf32c0008fcf8ac2921c76c049d31645230e52afce25bd0aaa77b3

    • SHA512

      e5d2807e00840d5f847da9135343eaf6e8f0b54ac398247ca1f264cdc89a992a1117d3681314b2c1e449fa675ec94e2b7dd812264c9cd75ab2587c6ad98d30de

    • SSDEEP

      196608:NmfRW/tss5R3xmzOP6cRv2jOzIb1+CToWKQDDE/JDRABS5Ol0:4qDxmzOCcYqe4WNDDCJDRABuOl0

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks