General

  • Target

    6ee006b8d9e3b3cd5eb8c7b12f448e2a0f9a851c3d68f0683ec97824a511ea0e

  • Size

    15.9MB

  • Sample

    231223-xkf7xadegk

  • MD5

    2a3eac5289aa52109b7a0d6392f52a09

  • SHA1

    3cc909d6c5801aede79d7a49b3ec938d44956713

  • SHA256

    6ee006b8d9e3b3cd5eb8c7b12f448e2a0f9a851c3d68f0683ec97824a511ea0e

  • SHA512

    b23f8fe5f6f4b1704626975cb5e5e588d300a6e36ed431bdcbee8b24dc6a3a8b73bd2943208eea731b4ee4bb73b657707e494dad5dea8490516cad37bb512649

  • SSDEEP

    393216:I67uvt39G+mx10sFhwbGeLz3DLYZ9oj1WIOrXNVfFhEL3:I67yNSH0Tv3D+9QArPAL3

Score
8/10

Malware Config

Targets

    • Target

      6ee006b8d9e3b3cd5eb8c7b12f448e2a0f9a851c3d68f0683ec97824a511ea0e

    • Size

      15.9MB

    • MD5

      2a3eac5289aa52109b7a0d6392f52a09

    • SHA1

      3cc909d6c5801aede79d7a49b3ec938d44956713

    • SHA256

      6ee006b8d9e3b3cd5eb8c7b12f448e2a0f9a851c3d68f0683ec97824a511ea0e

    • SHA512

      b23f8fe5f6f4b1704626975cb5e5e588d300a6e36ed431bdcbee8b24dc6a3a8b73bd2943208eea731b4ee4bb73b657707e494dad5dea8490516cad37bb512649

    • SSDEEP

      393216:I67uvt39G+mx10sFhwbGeLz3DLYZ9oj1WIOrXNVfFhEL3:I67yNSH0Tv3D+9QArPAL3

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads information about phone network operator.

    • Target

      gdtadv2.jar

    • Size

      142KB

    • MD5

      e5d803ba8d8135703327b24f675e8e02

    • SHA1

      e453997cf4545394c714014badbc6cf7fe503dc0

    • SHA256

      dfa679f665f30ed2130ffa10088d9080613e575d3dc7ea44e4e138d291dc9173

    • SHA512

      9a7ef4857b6d7f71480730d620a013a93be26c8f38078d690eff4fb423491d12b28e052a8c6f4b30d609301918e664b03c6c0f1c7d65fa84cfa31e7d824a6a54

    • SSDEEP

      3072:f9rsyOmTtPzKxvBFIZa51mVptsIPM64YvMKp1RgTMupKLSvaG774g:yyOmpPQp2K1mVbss4YvMKSTTpySva5g

    Score
    1/10

MITRE ATT&CK Matrix

Tasks