General

  • Target

    5c396b31f25c07be1e181aabbffef1458ef1b49f86d47d78c35455a27bdc22b8

  • Size

    31.8MB

  • Sample

    231223-wcwrysbegn

  • MD5

    fde8ac152bf3c97be84e20f631e2b1a3

  • SHA1

    4bd644f9692ee9a89e08b20e5e02190e39ad36c7

  • SHA256

    5c396b31f25c07be1e181aabbffef1458ef1b49f86d47d78c35455a27bdc22b8

  • SHA512

    5cbccfc223623f8d7e9a95d3c3b8cd3597e2797b708d821bebfa4c084af029f78f33a72d050d3bffb31d4d22601e32a6555fbc791d1ca12fdaa8c7c20a731feb

  • SSDEEP

    786432:7oh39x3aK1sJWGQ5a+YI2avI/98U+dagWGG:709cKeJWhaBlR+MgnG

Score
8/10

Malware Config

Targets

    • Target

      5c396b31f25c07be1e181aabbffef1458ef1b49f86d47d78c35455a27bdc22b8

    • Size

      31.8MB

    • MD5

      fde8ac152bf3c97be84e20f631e2b1a3

    • SHA1

      4bd644f9692ee9a89e08b20e5e02190e39ad36c7

    • SHA256

      5c396b31f25c07be1e181aabbffef1458ef1b49f86d47d78c35455a27bdc22b8

    • SHA512

      5cbccfc223623f8d7e9a95d3c3b8cd3597e2797b708d821bebfa4c084af029f78f33a72d050d3bffb31d4d22601e32a6555fbc791d1ca12fdaa8c7c20a731feb

    • SSDEEP

      786432:7oh39x3aK1sJWGQ5a+YI2avI/98U+dagWGG:709cKeJWhaBlR+MgnG

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks