General

  • Target

    6a505c7f44a10f23455869a4bae21f975ab7de3fbe290021c2eb991764df21ff

  • Size

    19.1MB

  • Sample

    231223-w9qxzafce7

  • MD5

    2bf21f25606ac0187612cdf448638b69

  • SHA1

    101ad2b5daf35196bcf27f17da329990225a8fa5

  • SHA256

    6a505c7f44a10f23455869a4bae21f975ab7de3fbe290021c2eb991764df21ff

  • SHA512

    7efe4861f9925ee0de4508fef941df944f5d3f7b349655186632b94b672aa9032607aa5b59ba662fbe9ebfca724986a4ffc2e4fd0e9d905965e481c19422d4fd

  • SSDEEP

    393216:ERVnIWI1pko6gfP5Mp8pk+++l3m94jRqBC7j7+cTEA+xb2IcbP:EjnIWHgJZpW0/t1ic4XlsP

Score
8/10

Malware Config

Targets

    • Target

      6a505c7f44a10f23455869a4bae21f975ab7de3fbe290021c2eb991764df21ff

    • Size

      19.1MB

    • MD5

      2bf21f25606ac0187612cdf448638b69

    • SHA1

      101ad2b5daf35196bcf27f17da329990225a8fa5

    • SHA256

      6a505c7f44a10f23455869a4bae21f975ab7de3fbe290021c2eb991764df21ff

    • SHA512

      7efe4861f9925ee0de4508fef941df944f5d3f7b349655186632b94b672aa9032607aa5b59ba662fbe9ebfca724986a4ffc2e4fd0e9d905965e481c19422d4fd

    • SSDEEP

      393216:ERVnIWI1pko6gfP5Mp8pk+++l3m94jRqBC7j7+cTEA+xb2IcbP:EjnIWHgJZpW0/t1ic4XlsP

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks