General

  • Target

    7c3a7700c4c6b096310c499c2e1c1b4c4ca1ff3f32ea152936ca272c8da5900a

  • Size

    28.6MB

  • Sample

    231223-ydqnfaehcr

  • MD5

    6a7b718d5029e5c249736a901487c28c

  • SHA1

    1c0831b86f020f9b04ecabb816e5b203c30f4391

  • SHA256

    7c3a7700c4c6b096310c499c2e1c1b4c4ca1ff3f32ea152936ca272c8da5900a

  • SHA512

    632b61db410199e6a101c2afee86c0db7fa916d8643e3df526f7ba9cde174fe542a79c6eea6813e321a69d39083769f7d5d6e3658ee771566a7e647fdecaa20a

  • SSDEEP

    786432:8GUosXFgrWXryVgi4I7+0/G4RS7UtkYb2Ybl:XPsX6r2AJtk+fh

Score
8/10

Malware Config

Targets

    • Target

      7c3a7700c4c6b096310c499c2e1c1b4c4ca1ff3f32ea152936ca272c8da5900a

    • Size

      28.6MB

    • MD5

      6a7b718d5029e5c249736a901487c28c

    • SHA1

      1c0831b86f020f9b04ecabb816e5b203c30f4391

    • SHA256

      7c3a7700c4c6b096310c499c2e1c1b4c4ca1ff3f32ea152936ca272c8da5900a

    • SHA512

      632b61db410199e6a101c2afee86c0db7fa916d8643e3df526f7ba9cde174fe542a79c6eea6813e321a69d39083769f7d5d6e3658ee771566a7e647fdecaa20a

    • SSDEEP

      786432:8GUosXFgrWXryVgi4I7+0/G4RS7UtkYb2Ybl:XPsX6r2AJtk+fh

    Score
    8/10
    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Checks Android system properties for emulator presence.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

MITRE ATT&CK Matrix

Tasks