General

  • Target

    67bfc4c7e945f24439c0fb1f1de9eb62cf14b675809171e6b4f752f58b1aa142

  • Size

    14.2MB

  • Sample

    231223-w48wlacgcj

  • MD5

    7916f2913b825beab0af45836df87818

  • SHA1

    e3f8a0e8090126fbc13e0e6c6983de2c238f02b5

  • SHA256

    67bfc4c7e945f24439c0fb1f1de9eb62cf14b675809171e6b4f752f58b1aa142

  • SHA512

    3f347dd1d888e9e8d2ca6a2ae6f8e1bb17f6c000e51c36b5461a7b785039801afa81fba155e9d615efc8b85ebe7ca98e34a5fe09107b9e0b1339a0910e0b492f

  • SSDEEP

    393216:0xTkt+OTNYU9IWKYD9LanwIUQZA3iwtmAZ4XV:Ykt+0N9pKYZIO3bVSl

Score
8/10

Malware Config

Targets

    • Target

      67bfc4c7e945f24439c0fb1f1de9eb62cf14b675809171e6b4f752f58b1aa142

    • Size

      14.2MB

    • MD5

      7916f2913b825beab0af45836df87818

    • SHA1

      e3f8a0e8090126fbc13e0e6c6983de2c238f02b5

    • SHA256

      67bfc4c7e945f24439c0fb1f1de9eb62cf14b675809171e6b4f752f58b1aa142

    • SHA512

      3f347dd1d888e9e8d2ca6a2ae6f8e1bb17f6c000e51c36b5461a7b785039801afa81fba155e9d615efc8b85ebe7ca98e34a5fe09107b9e0b1339a0910e0b492f

    • SSDEEP

      393216:0xTkt+OTNYU9IWKYD9LanwIUQZA3iwtmAZ4XV:Ykt+0N9pKYZIO3bVSl

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

    • Target

      alipay_plugin.apk

    • Size

      353KB

    • MD5

      dd52e580fdc30c22ff74a0a95699812b

    • SHA1

      dab8078684009e38a42cf6558334034c65abfe4c

    • SHA256

      fce475f3b93395275715d091da317ddc1a2b90ae7f69a2fc92054fed54b0305a

    • SHA512

      ba8f12c9f2f08a3597b8885046005f14a88be3225a9436effa1f88ff3621eef937328470650532184c7fd93eaf4fa3889f3a8302dda6d1e9a0f1ca364a4d8370

    • SSDEEP

      6144:WMlT2W4wFsn+Ma0dirSaWXwP6o3Ju0x2L3Rp5tPVKt9m8rpvCpCBJO0:WMl4wFU+MaoihWAN54htduNrpvCAvT

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

MITRE ATT&CK Matrix

Tasks