General

  • Target

    bfa420bee51b3918be4d4f70da09b9054a2929bde725464d70eef6d81aa5255d

  • Size

    9.8MB

  • Sample

    231224-dcgc6adhbl

  • MD5

    27e407b7f79354fa6cfb84dab39bf042

  • SHA1

    438343b01b6ebe6550a2db277b2a45f0159a9a54

  • SHA256

    bfa420bee51b3918be4d4f70da09b9054a2929bde725464d70eef6d81aa5255d

  • SHA512

    db7b26c497c29109f52c0e46f9e6a7ca9779af6ece1a6e03848d8be6269ddc56a30a081b2626a4d175e4283ae144af4e891cfd67a41ffab5dc461bc98d926d60

  • SSDEEP

    196608:ox8AXOlYPKFfFwcgZXNA/GSj2kLs52pNx/Ce3FMpkGpPymt:oPXOlYPIFwJNA/GXAZ/bFMp9p1

Malware Config

Targets

    • Target

      bfa420bee51b3918be4d4f70da09b9054a2929bde725464d70eef6d81aa5255d

    • Size

      9.8MB

    • MD5

      27e407b7f79354fa6cfb84dab39bf042

    • SHA1

      438343b01b6ebe6550a2db277b2a45f0159a9a54

    • SHA256

      bfa420bee51b3918be4d4f70da09b9054a2929bde725464d70eef6d81aa5255d

    • SHA512

      db7b26c497c29109f52c0e46f9e6a7ca9779af6ece1a6e03848d8be6269ddc56a30a081b2626a4d175e4283ae144af4e891cfd67a41ffab5dc461bc98d926d60

    • SSDEEP

      196608:ox8AXOlYPKFfFwcgZXNA/GSj2kLs52pNx/Ce3FMpkGpPymt:oPXOlYPIFwJNA/GXAZ/bFMp9p1

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

    • Target

      f28257ff8f1860776b8122d86c8df92b.apk

    • Size

      6.5MB

    • MD5

      f28257ff8f1860776b8122d86c8df92b

    • SHA1

      846deea4fe82a5419e5ca9d846a5c4b9ab7b43a6

    • SHA256

      1f74c6657903c4bfdaa62aa6e69402f72dca6a2bdd250fb3d0bcdc3aff647f9a

    • SHA512

      742e801cd53acf4fea8c5668e67d68683d33708b9f1653fb8443b15338d72f2cd6d5cee9738a20fab875cd89a469a7181a39b7a5acd3c1a5132619a6419e715b

    • SSDEEP

      98304:qTLmimUog/FNQgMo6cHcEBLWYgRQPkvzAhxuzp8XedPi5L0bzEb+aT2xCxK1Z1el:qdTog/QBcHc44WxuzprPAL3vTiCum

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks