General

  • Target

    a6d70c0f1660fd9ac9e45be3d78db72ba64d8a6152334bbf88460d101058e27e

  • Size

    19.4MB

  • Sample

    231224-ahmkksdfc3

  • MD5

    971760b5d5ce3a6d692589cdcb94283f

  • SHA1

    63c65a4b89ee4c33bb05f6928df50e4c5647d336

  • SHA256

    a6d70c0f1660fd9ac9e45be3d78db72ba64d8a6152334bbf88460d101058e27e

  • SHA512

    32b7ef26d177760620df5e7578a8776d405cac88ebc34a11ff9f9b41bca9183e42e3206e979b06d2935c1be6ecc8603356f7a324e2de58a73149e12b3e1821d3

  • SSDEEP

    393216:XM+EMItxA36WA8q+iuN3J1vKi5FtLhln2zDdF:XdExxLWA8q+7JfFtLhln+

Score
8/10

Malware Config

Targets

    • Target

      a6d70c0f1660fd9ac9e45be3d78db72ba64d8a6152334bbf88460d101058e27e

    • Size

      19.4MB

    • MD5

      971760b5d5ce3a6d692589cdcb94283f

    • SHA1

      63c65a4b89ee4c33bb05f6928df50e4c5647d336

    • SHA256

      a6d70c0f1660fd9ac9e45be3d78db72ba64d8a6152334bbf88460d101058e27e

    • SHA512

      32b7ef26d177760620df5e7578a8776d405cac88ebc34a11ff9f9b41bca9183e42e3206e979b06d2935c1be6ecc8603356f7a324e2de58a73149e12b3e1821d3

    • SSDEEP

      393216:XM+EMItxA36WA8q+iuN3J1vKi5FtLhln2zDdF:XdExxLWA8q+7JfFtLhln+

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks