General

  • Target

    af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977

  • Size

    15.4MB

  • Sample

    231224-bfxs7scbfj

  • MD5

    9e4110df1c6ec63fa15f426aed046763

  • SHA1

    ec7a997f6c3cf0edab5686f5dae2a48ab9d4aefc

  • SHA256

    af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977

  • SHA512

    1612bf32f3dc623198925502d802e6f20b6f633fabad443a2f79c671f324982a5e359e896e103a725f9e1ffb20db165b59a64056bcbc25872b7f30aa3931d9b2

  • SSDEEP

    393216:N8O3f1KRF0/h9oEGhBzrMA/xTXGQZCiy846kv3dOJuLq3iPRwp:N73Nki/hchZb/xHTyJPHm3I+p

Score
8/10

Malware Config

Targets

    • Target

      af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977

    • Size

      15.4MB

    • MD5

      9e4110df1c6ec63fa15f426aed046763

    • SHA1

      ec7a997f6c3cf0edab5686f5dae2a48ab9d4aefc

    • SHA256

      af6308bdfdfd95addd163daa81c9b8b908c67c3d922c7622768c89559c917977

    • SHA512

      1612bf32f3dc623198925502d802e6f20b6f633fabad443a2f79c671f324982a5e359e896e103a725f9e1ffb20db165b59a64056bcbc25872b7f30aa3931d9b2

    • SSDEEP

      393216:N8O3f1KRF0/h9oEGhBzrMA/xTXGQZCiy846kv3dOJuLq3iPRwp:N73Nki/hchZb/xHTyJPHm3I+p

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks