General

  • Target

    83385d349d845f191c7e9a930fc4d3f02f4d539ca1de999496d875d631e6718a

  • Size

    9.3MB

  • Sample

    231223-yqagzsfecm

  • MD5

    c5a69389d4547cf5e198807e08c23639

  • SHA1

    f36b602608d47a680b63d7da56484945ac270e62

  • SHA256

    83385d349d845f191c7e9a930fc4d3f02f4d539ca1de999496d875d631e6718a

  • SHA512

    e7e9e11ae7db14afbaa252ba829ba305b047e4769e6cfd2685b595a8290e99dae14322d228bce1e1d7aa72c51098213deb9a26e461bfc7563541dc7791510e6a

  • SSDEEP

    196608:l/1sQQnHQViBTjUzfdX/E12zqTRj7WWZq4SvppYh9LGEFDav4D5:8NnHPB31LRj7W4q9mxG4pD5

Score
8/10

Malware Config

Targets

    • Target

      83385d349d845f191c7e9a930fc4d3f02f4d539ca1de999496d875d631e6718a

    • Size

      9.3MB

    • MD5

      c5a69389d4547cf5e198807e08c23639

    • SHA1

      f36b602608d47a680b63d7da56484945ac270e62

    • SHA256

      83385d349d845f191c7e9a930fc4d3f02f4d539ca1de999496d875d631e6718a

    • SHA512

      e7e9e11ae7db14afbaa252ba829ba305b047e4769e6cfd2685b595a8290e99dae14322d228bce1e1d7aa72c51098213deb9a26e461bfc7563541dc7791510e6a

    • SSDEEP

      196608:l/1sQQnHQViBTjUzfdX/E12zqTRj7WWZq4SvppYh9LGEFDav4D5:8NnHPB31LRj7W4q9mxG4pD5

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      plugin-deploy.jar

    • Size

      202KB

    • MD5

      610ae20fa40cb991ef4670582bc3996a

    • SHA1

      bad8dbc9b7226fbd4f1b97dabe777c36605ccc9b

    • SHA256

      010690c6a9fe3d6e21c33940453cb2a5c41e26ac24ea42e3732111613701eede

    • SHA512

      8584fa3850e97276d6afef61dff9401531cd7830a3a7660fcc3b75c21c55196a59efad46ad763f1695f59c99874e29aa285ba9d9f43a5989d004a0e115d76b1b

    • SSDEEP

      3072:KZka1USzNNXt2YZvCb/VSD2h/8b1pHOfRmmFSB/0wTMVM6OZBryCFqCNh0Tbu/7f:KFz7XXWVSD2qb1pMRmIY/IkR/qCNOTC7

    Score
    1/10

MITRE ATT&CK Matrix

Tasks