General

  • Target

    ac09878358891bf277996d007af4775dc04f817d3d72786fd1c6d5b7602b1428

  • Size

    11.0MB

  • Sample

    231224-a39wlsebe2

  • MD5

    312485dc6d5f935bf5f1d21521d6e6b1

  • SHA1

    b2d43d98f930ebf52fa2acddd2d6319ac65fe98a

  • SHA256

    ac09878358891bf277996d007af4775dc04f817d3d72786fd1c6d5b7602b1428

  • SHA512

    0a80d258f38ef163b3515187f6c0ce8cdddf5ff1b7a1aeb95504f0b1ad064ce6ec6ae87c935ae99321d956c220832228ccf09ce0626e5260ec099a28a81e5904

  • SSDEEP

    196608:zFkG0UE2Yd5DMl/c+SYTPX1CcypXvh0AnEFQtDYgszS0RytnyMbumD:ZkGFE2hPR0cqZVtDY5S0gtBXD

Score
7/10

Malware Config

Targets

    • Target

      ac09878358891bf277996d007af4775dc04f817d3d72786fd1c6d5b7602b1428

    • Size

      11.0MB

    • MD5

      312485dc6d5f935bf5f1d21521d6e6b1

    • SHA1

      b2d43d98f930ebf52fa2acddd2d6319ac65fe98a

    • SHA256

      ac09878358891bf277996d007af4775dc04f817d3d72786fd1c6d5b7602b1428

    • SHA512

      0a80d258f38ef163b3515187f6c0ce8cdddf5ff1b7a1aeb95504f0b1ad064ce6ec6ae87c935ae99321d956c220832228ccf09ce0626e5260ec099a28a81e5904

    • SSDEEP

      196608:zFkG0UE2Yd5DMl/c+SYTPX1CcypXvh0AnEFQtDYgszS0RytnyMbumD:ZkGFE2hPR0cqZVtDY5S0gtBXD

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Checks the presence of a debugger

MITRE ATT&CK Enterprise v15

Tasks