General

  • Target

    6aeea3a3ebfa448f5791aea3d9f20f9ad45683bd300f18b7eede0c130d8776f1

  • Size

    15.3MB

  • Sample

    231223-xbn66afdd8

  • MD5

    215034ea81518214ae34c86c7afb4cf4

  • SHA1

    1ec064422beebf0e1d01c0115b78c71743055312

  • SHA256

    6aeea3a3ebfa448f5791aea3d9f20f9ad45683bd300f18b7eede0c130d8776f1

  • SHA512

    951e1b678863cebbf567c1ed051a06000f097b454eb6bda4b624e92ac38cab26999c3e9f58689cfbddbb3230334b4dcdb5b2969ab08ddd6452f752d84246eb91

  • SSDEEP

    393216:wQ6wxmEDeygHuabv9wP1V31E/6xXlb18u5lOVTU9wRZoERo:wcxmEehHzv9wPDSyxXn8u7OVTt/W

Score
8/10

Malware Config

Targets

    • Target

      6aeea3a3ebfa448f5791aea3d9f20f9ad45683bd300f18b7eede0c130d8776f1

    • Size

      15.3MB

    • MD5

      215034ea81518214ae34c86c7afb4cf4

    • SHA1

      1ec064422beebf0e1d01c0115b78c71743055312

    • SHA256

      6aeea3a3ebfa448f5791aea3d9f20f9ad45683bd300f18b7eede0c130d8776f1

    • SHA512

      951e1b678863cebbf567c1ed051a06000f097b454eb6bda4b624e92ac38cab26999c3e9f58689cfbddbb3230334b4dcdb5b2969ab08ddd6452f752d84246eb91

    • SSDEEP

      393216:wQ6wxmEDeygHuabv9wP1V31E/6xXlb18u5lOVTU9wRZoERo:wcxmEehHzv9wPDSyxXn8u7OVTt/W

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      gdtadv2.jar

    • Size

      639KB

    • MD5

      2a790fd5de797b91ec2039008c6b5e0e

    • SHA1

      5c28490eee21201bc596c1ca4c9bb546c5be7393

    • SHA256

      80681ec3d7b66ba02b3baaec467c90c75fd21d4d9eed3370e3e7a1a717bb454a

    • SHA512

      82b89bf7320802e26f55d6aa6b8f4056821f9159389e9ebff6ec3075daf8cda30d2a7449047310e64370be84b5cc1f9b9dc3e252582afb508129abd1c08b9c6c

    • SSDEEP

      12288:Oqo1h48mUSsielxZE3OdKzoFs3rAn26iwpYGIDD5tw/wDwkG3:Oq8h4CSs9xZjwrO28YGotw4cV

    Score
    1/10

MITRE ATT&CK Matrix

Tasks