General

  • Target

    6cbc92bb815ab540ab52ae6032828669c861fb9514b151d4f0cf4af2bc4ac23c

  • Size

    21.2MB

  • Sample

    231223-xfrsvaddar

  • MD5

    63a7a4f3344fd446efb10d6604dcf011

  • SHA1

    25e3bde5ca7456fa3d5b80393282c3ee7eccfcc1

  • SHA256

    6cbc92bb815ab540ab52ae6032828669c861fb9514b151d4f0cf4af2bc4ac23c

  • SHA512

    d6c7a143225952643da2bd73eaf0f0cedb5170248fb93ec684ba84221796a0b0f9e19e2234efb587e1c962dcb7b46d0687f6493d924901515b512ff7146d895b

  • SSDEEP

    393216:2bNcpbzLzAiwqgRqM4u7NxC0c9vWzUQXTmcgkXsXnVJUDB0hrPoy8yv:gaLOlRjNC0c9vWzp/PDBqDoc

Score
8/10

Malware Config

Targets

    • Target

      6cbc92bb815ab540ab52ae6032828669c861fb9514b151d4f0cf4af2bc4ac23c

    • Size

      21.2MB

    • MD5

      63a7a4f3344fd446efb10d6604dcf011

    • SHA1

      25e3bde5ca7456fa3d5b80393282c3ee7eccfcc1

    • SHA256

      6cbc92bb815ab540ab52ae6032828669c861fb9514b151d4f0cf4af2bc4ac23c

    • SHA512

      d6c7a143225952643da2bd73eaf0f0cedb5170248fb93ec684ba84221796a0b0f9e19e2234efb587e1c962dcb7b46d0687f6493d924901515b512ff7146d895b

    • SSDEEP

      393216:2bNcpbzLzAiwqgRqM4u7NxC0c9vWzUQXTmcgkXsXnVJUDB0hrPoy8yv:gaLOlRjNC0c9vWzp/PDBqDoc

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks