General

  • Target

    77965877c2cfed98a923ca715773c775542bdf347b2bd674be32a8397c5df998

  • Size

    23.0MB

  • Sample

    231223-x4xzrsedhr

  • MD5

    4e86d1655352b293a88c56ac53ce9cbb

  • SHA1

    d512ffcb8a856fa061b2c571dba8385d59930b31

  • SHA256

    77965877c2cfed98a923ca715773c775542bdf347b2bd674be32a8397c5df998

  • SHA512

    cdd458aa70e9471a0a491c536fae723fe6267c335cb9b571ed755df4cf486f6a665d73c9a39c51f0ef5e9f9fa51454c192a1a0e9c4f1448320ba044d8f70967e

  • SSDEEP

    393216:IhtfkZtrvci7aqCMKOXTz4Lx6Kcddt3cqmV0e5xKE2v6+Isn0As:IhtC9kAa9MKEEL0DbpTmV0qUJ640H

Score
8/10

Malware Config

Targets

    • Target

      77965877c2cfed98a923ca715773c775542bdf347b2bd674be32a8397c5df998

    • Size

      23.0MB

    • MD5

      4e86d1655352b293a88c56ac53ce9cbb

    • SHA1

      d512ffcb8a856fa061b2c571dba8385d59930b31

    • SHA256

      77965877c2cfed98a923ca715773c775542bdf347b2bd674be32a8397c5df998

    • SHA512

      cdd458aa70e9471a0a491c536fae723fe6267c335cb9b571ed755df4cf486f6a665d73c9a39c51f0ef5e9f9fa51454c192a1a0e9c4f1448320ba044d8f70967e

    • SSDEEP

      393216:IhtfkZtrvci7aqCMKOXTz4Lx6Kcddt3cqmV0e5xKE2v6+Isn0As:IhtC9kAa9MKEEL0DbpTmV0qUJ640H

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      plugin-deploy.jar

    • Size

      206KB

    • MD5

      02fe22caeb17a9d7c7f5c3914e3cda29

    • SHA1

      7e3293216263ab967ca6e9a3c55ba589444e3de7

    • SHA256

      0fba8eedb44faf95448ed7e25bcba48b49aa981e1e1e154fcbd90e48447813a4

    • SHA512

      020324dd3b38d6d75fbb54f18caf0bfdff38e27b0c18aa83989b53e9da96a6d6c780f281b21da8f1b41e3de1206306954dc9d1e42aa2dd12f500b66e04f4c647

    • SSDEEP

      6144:QVMQdIey/0Jl8L9umLtnWy6C0mNiEfWBm63:QVMbL/q2nL4g0mNXf7o

    Score
    1/10

MITRE ATT&CK Matrix

Tasks