General

  • Target

    5786acb5e308dcf2a7824cad37b4f2b8532eba3121512d13d64f6c89b9720096

  • Size

    30.1MB

  • Sample

    231223-vzexaabaem

  • MD5

    80bdd366e0a9282bd1dae48a4054de6b

  • SHA1

    85428cc48069b91bde11fc594cdf6805ac1f55ab

  • SHA256

    5786acb5e308dcf2a7824cad37b4f2b8532eba3121512d13d64f6c89b9720096

  • SHA512

    b6500a65f8d94374540b43641a8309d5d9c3b61d9acbad7c5497768e93b1523b851cd09626352be85f725b41636df49a006208063c060ded9069cf2bad49694b

  • SSDEEP

    786432:Lr1+3kiiJ+UUmdE9SdFiotQbGZ1achRQPmW:/yihyuFntpjPEmW

Score
8/10

Malware Config

Targets

    • Target

      5786acb5e308dcf2a7824cad37b4f2b8532eba3121512d13d64f6c89b9720096

    • Size

      30.1MB

    • MD5

      80bdd366e0a9282bd1dae48a4054de6b

    • SHA1

      85428cc48069b91bde11fc594cdf6805ac1f55ab

    • SHA256

      5786acb5e308dcf2a7824cad37b4f2b8532eba3121512d13d64f6c89b9720096

    • SHA512

      b6500a65f8d94374540b43641a8309d5d9c3b61d9acbad7c5497768e93b1523b851cd09626352be85f725b41636df49a006208063c060ded9069cf2bad49694b

    • SSDEEP

      786432:Lr1+3kiiJ+UUmdE9SdFiotQbGZ1achRQPmW:/yihyuFntpjPEmW

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks