General

  • Target

    b62952b4145d10480b6d95d667c722aed5fc60521ab5a09b195869708dcc6d6e

  • Size

    12.4MB

  • Sample

    231224-b6sxyacgdr

  • MD5

    b6ad78c238afefbe4aab18cd8e22b38c

  • SHA1

    665c73833d8c2500e94d5eee724c19a86a790b2f

  • SHA256

    b62952b4145d10480b6d95d667c722aed5fc60521ab5a09b195869708dcc6d6e

  • SHA512

    ae0713686e56bed8494c3453c27a0a506b48c99c7e98e934c35f7e4f209ec4408ba6c2fc11719118aa296a90d98b25744759252657ce3f4b5694e6a7cd5eaa93

  • SSDEEP

    196608:ZSBMNY2dZxPuWGWt7QGjA0MGL6sWHv2LUQYbh1lyFwFhtlkrB4Tx0ZL3TcrW84z5:oBGYYXuE7xAG6s8QYF13TQ+QP84d

Score
8/10

Malware Config

Targets

    • Target

      b62952b4145d10480b6d95d667c722aed5fc60521ab5a09b195869708dcc6d6e

    • Size

      12.4MB

    • MD5

      b6ad78c238afefbe4aab18cd8e22b38c

    • SHA1

      665c73833d8c2500e94d5eee724c19a86a790b2f

    • SHA256

      b62952b4145d10480b6d95d667c722aed5fc60521ab5a09b195869708dcc6d6e

    • SHA512

      ae0713686e56bed8494c3453c27a0a506b48c99c7e98e934c35f7e4f209ec4408ba6c2fc11719118aa296a90d98b25744759252657ce3f4b5694e6a7cd5eaa93

    • SSDEEP

      196608:ZSBMNY2dZxPuWGWt7QGjA0MGL6sWHv2LUQYbh1lyFwFhtlkrB4Tx0ZL3TcrW84z5:oBGYYXuE7xAG6s8QYF13TQ+QP84d

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      clean_robot.apk

    • Size

      138KB

    • MD5

      4b31ed065618d2553b64c83127ecf698

    • SHA1

      aa5cee4147e90c362e9f1e804f31af06cffd60c7

    • SHA256

      0ef662cefa04b69c128212edb3847a0b14876a52cd4175527c9489f87d0136cf

    • SHA512

      6febfe8d2ad16ded31439917775e2a032bfe3d01b1bb37461d3c104faeaa978fe5d771af5b845777575ace8007a0bd8bbc823314c41c0e4aec089209ee5c3fe6

    • SSDEEP

      3072:/5DT5xLlH4v9tmgcn6sQfqCeqR6Z188nWFcFXq80:/5DT/LlHQggK6heqR6IyCcF0

    Score
    4/10

MITRE ATT&CK Matrix

Tasks