General

  • Target

    afa82c6d0aa8ee8d3b10249b738876556526aa29c640279a58b0c6557415b05f

  • Size

    9.5MB

  • Sample

    231224-bgyf5aefc2

  • MD5

    138cb475fd2cf3b5d6e465218ee77263

  • SHA1

    1bca27c77653c5c4559411d49120c39414a5b91f

  • SHA256

    afa82c6d0aa8ee8d3b10249b738876556526aa29c640279a58b0c6557415b05f

  • SHA512

    c5a19543eeaf93b10aab984fb9958f8868d4b083ec842b4bbd3fe3f55b38feb423cb55052357789c14d3721729ef1f61483e3d5e3677b67d5b5c98bef8448211

  • SSDEEP

    196608:5QT+d6JVPVgZkHZIUbLrOiDXsb/hahNZJpu0w6Xt:5U+4PeCHnSiDuIvE6d

Score
7/10

Malware Config

Targets

    • Target

      afa82c6d0aa8ee8d3b10249b738876556526aa29c640279a58b0c6557415b05f

    • Size

      9.5MB

    • MD5

      138cb475fd2cf3b5d6e465218ee77263

    • SHA1

      1bca27c77653c5c4559411d49120c39414a5b91f

    • SHA256

      afa82c6d0aa8ee8d3b10249b738876556526aa29c640279a58b0c6557415b05f

    • SHA512

      c5a19543eeaf93b10aab984fb9958f8868d4b083ec842b4bbd3fe3f55b38feb423cb55052357789c14d3721729ef1f61483e3d5e3677b67d5b5c98bef8448211

    • SSDEEP

      196608:5QT+d6JVPVgZkHZIUbLrOiDXsb/hahNZJpu0w6Xt:5U+4PeCHnSiDuIvE6d

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Target

      plugin-deploy.jar

    • Size

      214KB

    • MD5

      394bd5d7d2d595c19a27fa95959efc23

    • SHA1

      1c19442c8f05af69d8cb01b4c0836dc836c66b8f

    • SHA256

      af090825241b7b0c0fab2f6fb72601204fafab385076d3a54c00711a52784e27

    • SHA512

      ef9b2484f0e02c6d53ce76b4daf0182406fe72674bf051abdfd8f5148805342c5468a48d92eba5ebee3172cb546907a09b9e731f6b60e762394514f8e56aef82

    • SSDEEP

      3072:73CqvRecM1MPRW7mDODDMERFQHu9RridcgCnkCj+Sqi0uMFSHubErMoUcUSF2o:LlJJZi9LQHZdqq5uMFIubEwElFr

    Score
    1/10

MITRE ATT&CK Matrix

Tasks