General

  • Target

    84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b

  • Size

    22.6MB

  • Sample

    231223-yr7h4sffbp

  • MD5

    ad34c86f393fe3a2b74b3a5be804d356

  • SHA1

    349b7dce65418fa2232bff24227386eefd14b8e5

  • SHA256

    84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b

  • SHA512

    b42a37f3fe600ea7a1111bb4879bd2cc2f8a1115b61a41d00b4b66c5a03c593474163e6904058c159e67e77a218e7648d1f7f1ebe88c94bf9a129b05b360b059

  • SSDEEP

    393216:NtZOZN23A0ZqoPet9cdSRoRNL32BIdw0YX5z7BrJ8d6IoBIeUKOwTF59mWUYh+xJ:TZOrWgoPeYSRobLwwS8kSe2I+xfJH

Score
8/10

Malware Config

Targets

    • Target

      84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b

    • Size

      22.6MB

    • MD5

      ad34c86f393fe3a2b74b3a5be804d356

    • SHA1

      349b7dce65418fa2232bff24227386eefd14b8e5

    • SHA256

      84314f2420dda9ad58ba2265feb3884a518a4539dac312c02046eef48b8d262b

    • SHA512

      b42a37f3fe600ea7a1111bb4879bd2cc2f8a1115b61a41d00b4b66c5a03c593474163e6904058c159e67e77a218e7648d1f7f1ebe88c94bf9a129b05b360b059

    • SSDEEP

      393216:NtZOZN23A0ZqoPet9cdSRoRNL32BIdw0YX5z7BrJ8d6IoBIeUKOwTF59mWUYh+xJ:TZOrWgoPeYSRobLwwS8kSe2I+xfJH

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks