General

  • Target

    8bfacf9b6066875278f30521be362fe21bb31a15eb14dacbdc38acf20b24d67c

  • Size

    12.4MB

  • Sample

    231223-zeq62aaga7

  • MD5

    d43b4951087c10cc240134e6deb3579b

  • SHA1

    1f976a022af3469481ae6b8f06ef2a85276e13cb

  • SHA256

    8bfacf9b6066875278f30521be362fe21bb31a15eb14dacbdc38acf20b24d67c

  • SHA512

    d56f240beffdc8cc75b547cd41b59f53009470e221b0e83d52752f2b949bdecced83935b11d8b2c90b23e7c38fcd902cf325d11dcc8c0b45d20ca32eb5bada63

  • SSDEEP

    196608:o3SBMNY2dZxPuWGWt7QejA0MGL6sW12QDp+RSholyFPhhRyo9oj3cZQhSIr4494A:oCBGYYXuE7xAG6sw+ReoQ/Lu/F94A

Score
8/10

Malware Config

Targets

    • Target

      8bfacf9b6066875278f30521be362fe21bb31a15eb14dacbdc38acf20b24d67c

    • Size

      12.4MB

    • MD5

      d43b4951087c10cc240134e6deb3579b

    • SHA1

      1f976a022af3469481ae6b8f06ef2a85276e13cb

    • SHA256

      8bfacf9b6066875278f30521be362fe21bb31a15eb14dacbdc38acf20b24d67c

    • SHA512

      d56f240beffdc8cc75b547cd41b59f53009470e221b0e83d52752f2b949bdecced83935b11d8b2c90b23e7c38fcd902cf325d11dcc8c0b45d20ca32eb5bada63

    • SSDEEP

      196608:o3SBMNY2dZxPuWGWt7QejA0MGL6sW12QDp+RSholyFPhhRyo9oj3cZQhSIr4494A:oCBGYYXuE7xAG6sw+ReoQ/Lu/F94A

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      clean_robot.apk

    • Size

      138KB

    • MD5

      4b31ed065618d2553b64c83127ecf698

    • SHA1

      aa5cee4147e90c362e9f1e804f31af06cffd60c7

    • SHA256

      0ef662cefa04b69c128212edb3847a0b14876a52cd4175527c9489f87d0136cf

    • SHA512

      6febfe8d2ad16ded31439917775e2a032bfe3d01b1bb37461d3c104faeaa978fe5d771af5b845777575ace8007a0bd8bbc823314c41c0e4aec089209ee5c3fe6

    • SSDEEP

      3072:/5DT5xLlH4v9tmgcn6sQfqCeqR6Z188nWFcFXq80:/5DT/LlHQggK6heqR6IyCcF0

    Score
    4/10

MITRE ATT&CK Matrix

Tasks