General

  • Target

    87ccec99d680f4465ef40e29b72d8466879a749063e7d64bead64379d1fdf2e7

  • Size

    12.5MB

  • Sample

    231223-y2rkmsgaaj

  • MD5

    2998889f57456535462fb8a850c23d18

  • SHA1

    9b12e00433b7655f8fce529e0e6ae578b2cc1f1f

  • SHA256

    87ccec99d680f4465ef40e29b72d8466879a749063e7d64bead64379d1fdf2e7

  • SHA512

    37a5dc3d077f0e86af1efbf7eb8835002822b912b8eed524a217a2fa4f44d8214e10eee120b63882854800d6f4f194c0f88befcea053b3f6499c7b19d8f7fa5f

  • SSDEEP

    196608:QTWD0oSMP+hTxMkMcDsCbTMP2mejdjLtuUTX/v5U2QGfQ5V695pcI895+95Nwm:QaIhKcu2HjlLtJ7ZU2QOQ5Mbpwb+bNd

Score
7/10

Malware Config

Targets

    • Target

      87ccec99d680f4465ef40e29b72d8466879a749063e7d64bead64379d1fdf2e7

    • Size

      12.5MB

    • MD5

      2998889f57456535462fb8a850c23d18

    • SHA1

      9b12e00433b7655f8fce529e0e6ae578b2cc1f1f

    • SHA256

      87ccec99d680f4465ef40e29b72d8466879a749063e7d64bead64379d1fdf2e7

    • SHA512

      37a5dc3d077f0e86af1efbf7eb8835002822b912b8eed524a217a2fa4f44d8214e10eee120b63882854800d6f4f194c0f88befcea053b3f6499c7b19d8f7fa5f

    • SSDEEP

      196608:QTWD0oSMP+hTxMkMcDsCbTMP2mejdjLtuUTX/v5U2QGfQ5V695pcI895+95Nwm:QaIhKcu2HjlLtJ7ZU2QOQ5Mbpwb+bNd

    Score
    7/10
    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks