General

  • Target

    a5e513bea95ff8ed59d6e4a2b26f03e556711d0be75bcfc63e8040b0a8f5dc75

  • Size

    18.7MB

  • Sample

    231224-aecwzadee5

  • MD5

    a32baf0580f20cf469bca2ff6504c042

  • SHA1

    38238d1061d1d7df5306a7a027a73d8a133780f7

  • SHA256

    a5e513bea95ff8ed59d6e4a2b26f03e556711d0be75bcfc63e8040b0a8f5dc75

  • SHA512

    a76ffe7ddd049ba7326b0d54b0c40f3c218d19a264be22c646b8bebdcaba4aec43513fd986986d473d9e08163d8b7fdcedb4dc1c77f08e777da076a4dc0edbd7

  • SSDEEP

    393216:15cHE4/74Fphk5FgLNNcAHiiYM2GbLX4U4w2Z8ZroxTZ:15AE4MFvk5FgLNNcqFbzH4w2Z8Zral

Score
8/10

Malware Config

Targets

    • Target

      a5e513bea95ff8ed59d6e4a2b26f03e556711d0be75bcfc63e8040b0a8f5dc75

    • Size

      18.7MB

    • MD5

      a32baf0580f20cf469bca2ff6504c042

    • SHA1

      38238d1061d1d7df5306a7a027a73d8a133780f7

    • SHA256

      a5e513bea95ff8ed59d6e4a2b26f03e556711d0be75bcfc63e8040b0a8f5dc75

    • SHA512

      a76ffe7ddd049ba7326b0d54b0c40f3c218d19a264be22c646b8bebdcaba4aec43513fd986986d473d9e08163d8b7fdcedb4dc1c77f08e777da076a4dc0edbd7

    • SSDEEP

      393216:15cHE4/74Fphk5FgLNNcAHiiYM2GbLX4U4w2Z8ZroxTZ:15AE4MFvk5FgLNNcqFbzH4w2Z8Zral

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks