General

  • Target

    b596b9c5d65146b444c79d3eaf866260d87b1fb89df6a127482333aebef0687b

  • Size

    5.8MB

  • Sample

    231224-b49gxafca4

  • MD5

    16bd1b5101b861979ba93edec8c8a877

  • SHA1

    29f3632550008dbce6fb134ac0a813740e3a93d6

  • SHA256

    b596b9c5d65146b444c79d3eaf866260d87b1fb89df6a127482333aebef0687b

  • SHA512

    d9e1cc2c0c97b25db6da9aa58098c204ca1563495c6b06130266318dc71499b726771ec5787028446586001b4c771821447c013dbcc1f134b956de2ff935f872

  • SSDEEP

    98304:TtUAAwF0hy09R/woQlkjG9B0+L54RfAjjYA2K126uowD1:TtUAAlhyc97QWC30+Lm1AjjkK12owJ

Score
8/10

Malware Config

Targets

    • Target

      b596b9c5d65146b444c79d3eaf866260d87b1fb89df6a127482333aebef0687b

    • Size

      5.8MB

    • MD5

      16bd1b5101b861979ba93edec8c8a877

    • SHA1

      29f3632550008dbce6fb134ac0a813740e3a93d6

    • SHA256

      b596b9c5d65146b444c79d3eaf866260d87b1fb89df6a127482333aebef0687b

    • SHA512

      d9e1cc2c0c97b25db6da9aa58098c204ca1563495c6b06130266318dc71499b726771ec5787028446586001b4c771821447c013dbcc1f134b956de2ff935f872

    • SSDEEP

      98304:TtUAAwF0hy09R/woQlkjG9B0+L54RfAjjYA2K126uowD1:TtUAAlhyc97QWC30+Lm1AjjkK12owJ

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      wifipush_internal.dwt

    • Size

      71KB

    • MD5

      96d3836432fc0d72398e3e35ff279ca6

    • SHA1

      557f06c40f2205fe84d75c9558068243ba514359

    • SHA256

      d023f1df03111e4b5191557a8040ad9a8f6737753d298dc51146ecf8d61fa8f3

    • SHA512

      76cd4eec0b5058caa2cefed344fbed1876f9d2db1d711568d451323de53f0763acd9b0f4c70db9342c79ba0a0e6a189dbf66fefc1f87d2981c2548a5f1dbbf82

    • SSDEEP

      1536:ZITW+OBLM6YITyKLs/lnfdHtbGDtMVVwi0sYWKeXJ9:OTMB46ByKLalTSDy/vX3

    Score
    1/10

MITRE ATT&CK Matrix

Tasks