General

  • Target

    6ca31cf190fb42ea492fa2d0f7929445eca9cdd3fff35bee8b68aa96e703da8b

  • Size

    21.7MB

  • Sample

    231223-xfgymsffa6

  • MD5

    16edc8c5978ea91a3a685a87db370267

  • SHA1

    577e664cbefad34b2125f2100cd7b8c46bc373e8

  • SHA256

    6ca31cf190fb42ea492fa2d0f7929445eca9cdd3fff35bee8b68aa96e703da8b

  • SHA512

    fbc181c3548dc91c3690c315e6a32b6a462638beeaea8c780531b261f69c3ee117b09e05228e467d1a5d49b21d5344b2c0763e50f08650a8de3f9e8445204a8a

  • SSDEEP

    393216:zBk5GiJY7gp9HCVM/0l+Qv1ESFzYnO/XPSXSWzbrSVXLuxTW3cYaLwaE35vpYIbc:tpiJgb3l+yFzAEPL2brS4MaL7AvpYIbc

Score
8/10

Malware Config

Targets

    • Target

      6ca31cf190fb42ea492fa2d0f7929445eca9cdd3fff35bee8b68aa96e703da8b

    • Size

      21.7MB

    • MD5

      16edc8c5978ea91a3a685a87db370267

    • SHA1

      577e664cbefad34b2125f2100cd7b8c46bc373e8

    • SHA256

      6ca31cf190fb42ea492fa2d0f7929445eca9cdd3fff35bee8b68aa96e703da8b

    • SHA512

      fbc181c3548dc91c3690c315e6a32b6a462638beeaea8c780531b261f69c3ee117b09e05228e467d1a5d49b21d5344b2c0763e50f08650a8de3f9e8445204a8a

    • SSDEEP

      393216:zBk5GiJY7gp9HCVM/0l+Qv1ESFzYnO/XPSXSWzbrSVXLuxTW3cYaLwaE35vpYIbc:tpiJgb3l+yFzAEPL2brS4MaL7AvpYIbc

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks