General

  • Target

    5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97

  • Size

    16.6MB

  • Sample

    231223-wk4sjaebe3

  • MD5

    4f4836c37e257bba0d5a9456708e4021

  • SHA1

    1d2e5648f1604c89b0e62903a05536b0ad7aa0a6

  • SHA256

    5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97

  • SHA512

    ef6fc2ea0df484342f3a9056bcbe816eca7570e780b94656c892e4205828255158afa3c7c3ed52210b273f0430fbbba939fed282caab7621ac254f3691200fcb

  • SSDEEP

    393216:CS/lntGc13ytZ0m97p0sEN6opj2VL8bu59LwkeqrOiAt:CcNQc13yz0mb0NNHTU9Y7/

Score
8/10

Malware Config

Targets

    • Target

      5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97

    • Size

      16.6MB

    • MD5

      4f4836c37e257bba0d5a9456708e4021

    • SHA1

      1d2e5648f1604c89b0e62903a05536b0ad7aa0a6

    • SHA256

      5ebdd4e5a8ff86df51c76164fb1950b526adfa8ca6da975e695dfcf2dd399f97

    • SHA512

      ef6fc2ea0df484342f3a9056bcbe816eca7570e780b94656c892e4205828255158afa3c7c3ed52210b273f0430fbbba939fed282caab7621ac254f3691200fcb

    • SSDEEP

      393216:CS/lntGc13ytZ0m97p0sEN6opj2VL8bu59LwkeqrOiAt:CcNQc13yz0mb0NNHTU9Y7/

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks