General

  • Target

    91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278

  • Size

    14.2MB

  • Sample

    231223-z2h4yahagr

  • MD5

    01f4909c69774e58e2a2eccecab5eee6

  • SHA1

    e8e0afdefb837c0afbc03f92f33b838c8cb8f23a

  • SHA256

    91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278

  • SHA512

    fc86f8f4feb6c6bf455ff4e8feabfa386bbb941d4fcb7e1df23dbf52d0401509961a7be424f70ce2be8d7d3fcbc15eb46f4f6db713cd4f9dfadb2d33fe2d896d

  • SSDEEP

    393216:PBgNE1c/Ms2WXHF+hzhBiQ1xKy+Og+Ov9bi4xb2I52:PBgNE1m9BIzviaxwVvRln2

Score
8/10

Malware Config

Targets

    • Target

      91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278

    • Size

      14.2MB

    • MD5

      01f4909c69774e58e2a2eccecab5eee6

    • SHA1

      e8e0afdefb837c0afbc03f92f33b838c8cb8f23a

    • SHA256

      91ab66e41d49dc70cb23bc517bb989b7fdb175fe493214d717743eef644af278

    • SHA512

      fc86f8f4feb6c6bf455ff4e8feabfa386bbb941d4fcb7e1df23dbf52d0401509961a7be424f70ce2be8d7d3fcbc15eb46f4f6db713cd4f9dfadb2d33fe2d896d

    • SSDEEP

      393216:PBgNE1c/Ms2WXHF+hzhBiQ1xKy+Og+Ov9bi4xb2I52:PBgNE1m9BIzviaxwVvRln2

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Checks Android system properties for emulator presence.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads device software version

      Uses Android APIs to read software version number for the device (IMEI/SV for GSM devices).

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks