General

  • Target

    7093bf50949b3ae6dffe4206cf2d976810d9ee9a2425d583c0beb49118ae10f4

  • Size

    27.6MB

  • Sample

    231223-xnkz9sdgbr

  • MD5

    040bfc60e37fdaf3bda61ba8af5a5e3b

  • SHA1

    cbc92bfc7fd437415e80f0eea1875ffe5951671c

  • SHA256

    7093bf50949b3ae6dffe4206cf2d976810d9ee9a2425d583c0beb49118ae10f4

  • SHA512

    3a5fa7465b5ef38f5cdb2b277c26b5d0f12133362f9748d167e8b1bd3bd710757bea934fff2ed78d553feaf845dc3baefc6e61cbc6253a85b15396a69aad16ff

  • SSDEEP

    786432:Rc9EqCfPq3rfOlIBtUV47Pl5vw2jaHpL1/3ifu:Rc9EqCfPCWGBI47Ple2sF3ifu

Score
8/10

Malware Config

Targets

    • Target

      7093bf50949b3ae6dffe4206cf2d976810d9ee9a2425d583c0beb49118ae10f4

    • Size

      27.6MB

    • MD5

      040bfc60e37fdaf3bda61ba8af5a5e3b

    • SHA1

      cbc92bfc7fd437415e80f0eea1875ffe5951671c

    • SHA256

      7093bf50949b3ae6dffe4206cf2d976810d9ee9a2425d583c0beb49118ae10f4

    • SHA512

      3a5fa7465b5ef38f5cdb2b277c26b5d0f12133362f9748d167e8b1bd3bd710757bea934fff2ed78d553feaf845dc3baefc6e61cbc6253a85b15396a69aad16ff

    • SSDEEP

      786432:Rc9EqCfPq3rfOlIBtUV47Pl5vw2jaHpL1/3ifu:Rc9EqCfPCWGBI47Ple2sF3ifu

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks