General

  • Target

    ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214

  • Size

    13.9MB

  • Sample

    231224-eb8xfsehdp

  • MD5

    d9b6791b42abe0a1d98388874996befc

  • SHA1

    34f862a415c87b2baf32aef7d5a2d34a08987f8a

  • SHA256

    ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214

  • SHA512

    ed9298c40176ce70c9c062ec51cf6b5cb9eb661f1ba17bbd0fe4598487e8ea089cecf7bea71c7fdf889bc1b6909232dd048d080efec0f5bb63d26a7e249919c6

  • SSDEEP

    393216:O15OG2ENl4aSppIQ4y9QpUHJwIanMDzolysshm:gEijS+Q4yrHJwIEizoINm

Score
7/10

Malware Config

Targets

    • Target

      ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214

    • Size

      13.9MB

    • MD5

      d9b6791b42abe0a1d98388874996befc

    • SHA1

      34f862a415c87b2baf32aef7d5a2d34a08987f8a

    • SHA256

      ca5e72e18f77b97dfd67f5224d371b32b6668f4da89e345675da5f82e68d2214

    • SHA512

      ed9298c40176ce70c9c062ec51cf6b5cb9eb661f1ba17bbd0fe4598487e8ea089cecf7bea71c7fdf889bc1b6909232dd048d080efec0f5bb63d26a7e249919c6

    • SSDEEP

      393216:O15OG2ENl4aSppIQ4y9QpUHJwIanMDzolysshm:gEijS+Q4yrHJwIEizoINm

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Target

      gdtadv2.jar

    • Size

      636KB

    • MD5

      cf57d4f9f2ccd86816c4f02989252423

    • SHA1

      6978f24478ba9baa004bf4d21db251fe67957ec2

    • SHA256

      e6df28c535e661d33a134407674c32555fb985a6a8f3bf8ec743150db61fa7ec

    • SHA512

      f759aea4c4fb91ce69f8238bd0e7c0f99b826cad04fc9c5f47c5afde2eceaf71d515d00f0e08b73c169e1a8bd21a17ddd3971bae27ddeb6960daaf5c5d719d4b

    • SSDEEP

      12288:lsocNwAPog24tsNbfevYHzN953QZlo5M0f+DMpP7x07S232vjUG:MNvPA9oYHzN953QEM0npDx0nm

    Score
    1/10

MITRE ATT&CK Matrix

Tasks