General

  • Target

    c5ffc1f962f5f28562e7990aa9a31bff46a6c97f3e731d373d56d0a15f7e3ba6

  • Size

    14.9MB

  • Sample

    231224-dyfnrahad5

  • MD5

    40afec4801a73afbea9ba6e6b0d843e0

  • SHA1

    45593e4d7e2d0ac70856b1c0edd09ff187c117a0

  • SHA256

    c5ffc1f962f5f28562e7990aa9a31bff46a6c97f3e731d373d56d0a15f7e3ba6

  • SHA512

    d2f67c775a866b05165181247926276ba81d55ca74ea7dd495ef10737ec8803d10ca6e18483cf820c01087d07967f312afca169d74b8b95cf592016b377ba9ac

  • SSDEEP

    393216:+Ku1717icuOBysQER67voPVuHoXGER677PCsCXVlZyeQe:lu1RpUIhwIX4CsmV+he

Score
8/10

Malware Config

Targets

    • Target

      c5ffc1f962f5f28562e7990aa9a31bff46a6c97f3e731d373d56d0a15f7e3ba6

    • Size

      14.9MB

    • MD5

      40afec4801a73afbea9ba6e6b0d843e0

    • SHA1

      45593e4d7e2d0ac70856b1c0edd09ff187c117a0

    • SHA256

      c5ffc1f962f5f28562e7990aa9a31bff46a6c97f3e731d373d56d0a15f7e3ba6

    • SHA512

      d2f67c775a866b05165181247926276ba81d55ca74ea7dd495ef10737ec8803d10ca6e18483cf820c01087d07967f312afca169d74b8b95cf592016b377ba9ac

    • SSDEEP

      393216:+Ku1717icuOBysQER67voPVuHoXGER677PCsCXVlZyeQe:lu1RpUIhwIX4CsmV+he

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      PlayerUIApk.apk

    • Size

      121KB

    • MD5

      bfb5f2f10dec99ad7dfb9802f4b409c4

    • SHA1

      30f463422bf2a873f084b591d013034a600358c6

    • SHA256

      98c699945a8b233732bdfeccef24640d938a781a35f2aad104dce3a62e55c895

    • SHA512

      923fb9243368a2492883beb1f8e2722c6cfefb8c749f9b8940646c8513a4f2f312c6c423b5e15c00cf7a0c436f80bb9cb6c97185a31371b30120a2739c78d187

    • SSDEEP

      3072:6F45qDOeq+HGWZoFEh4YVLeTYJ90wHvDsEb6RI:8DzgehRdey90SvN8I

    Score
    1/10
    • Target

      base.bin

    • Size

      755KB

    • MD5

      2902dd139d19c64a72c90ca4827b18c9

    • SHA1

      f9efccc9f1e126af2d1f8d32a56d795960e151da

    • SHA256

      788ce457eef842cef3f266436e26616bbf45806b32216bbbc4a85f936cd2ef6e

    • SHA512

      0de182ab377d82ebc57ba06d9bb0f4bac4a6e83a7862552afda1824bb9f6af9dfad7df2da66b2a20295d48d05ba29400494b50264519cd0733d2d69eab693f52

    • SSDEEP

      12288:4X/vnntsSFL+h9EMfxpT5Z9n7Awn+ngjEXiMKLclSMHSX5Z104Uvbtee7OT0NLPM:EvntpcnEMfxTbn7xRjEwajyX5ZLecsOp

    Score
    1/10
    • Target

      bdxadsdk.jar

    • Size

      176KB

    • MD5

      c3c40b07e6e1642b8028b4cd5e19e9a3

    • SHA1

      8e74dc5b862b872a60c3d5456bd153198abb076e

    • SHA256

      0db0e2a84a83fbddaa77fa4aee060accbf702c3e81572368be6baa2cd4e4316a

    • SHA512

      b3a203df3dedc18bf46db586af9cb1e284839df7e2220427c5407be4d081b269278aa99d02d7c49951bedacc0d04d360cda1b00a0805daa0bc369cb4572041ed

    • SSDEEP

      3072:LixoYumZRK2nn3ZVMSwN5W/pMzIv1H0V7+9tsiCx1IKsclpWw/fafppPv:mBumZEaJWSwN5EM0dH0VgcVVfafrPv

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      185KB

    • MD5

      61d382a27900ed2d4cebdf457267f1e5

    • SHA1

      f80ad366ab26348f6a34087363ff1ca2d2d5e993

    • SHA256

      820eae192b97f58efec7165398c08125315a15bf474695fe68ff06f19c9cdd00

    • SHA512

      0dbf43014c0f4b8485e3345d6e1521485099d6e91ad585b25ce349aaff36e8c7a3db88b73d27db6fecf20dfd962b4d41708791c9a18aed39d86c05525d5c3217

    • SSDEEP

      3072:7JH59twK9nIvYAAj5P1CNiq3l4QVacCZ0eqTMeipL43j/y:7d59HJIXcYoq1BMjJ8Dy

    Score
    1/10

MITRE ATT&CK Matrix

Tasks