General

  • Target

    e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a

  • Size

    12.5MB

  • Sample

    231224-gwb5bsbfb9

  • MD5

    8a78c2e9c9675a107c79a1f3c4ce1f01

  • SHA1

    7122475541fc929bd4ea1fc65bfe4d2c8d63cc63

  • SHA256

    e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a

  • SHA512

    8ac9e3288c2b664e9811cd4b164e3ac7fe03ba7e3ea84569d5f23e15b21f79bd40aebfa8a2ac65b12ab15ed535325784db1f78e48b22f86397a5d8a2d5b05211

  • SSDEEP

    393216:PMcvpuZSsmiyMWO9IyCZUKtOYvMa3MQ/VxpQiHI6gb:EvSsDwO9IfDZvcQ/lHItb

Score
8/10

Malware Config

Targets

    • Target

      e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a

    • Size

      12.5MB

    • MD5

      8a78c2e9c9675a107c79a1f3c4ce1f01

    • SHA1

      7122475541fc929bd4ea1fc65bfe4d2c8d63cc63

    • SHA256

      e43d1e07ca2202f3d7969f9d9ccf3af7e1531b770143260c79361d4780a9ae3a

    • SHA512

      8ac9e3288c2b664e9811cd4b164e3ac7fe03ba7e3ea84569d5f23e15b21f79bd40aebfa8a2ac65b12ab15ed535325784db1f78e48b22f86397a5d8a2d5b05211

    • SSDEEP

      393216:PMcvpuZSsmiyMWO9IyCZUKtOYvMa3MQ/VxpQiHI6gb:EvSsDwO9IfDZvcQ/lHItb

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      gdtadv2.jar

    • Size

      443KB

    • MD5

      232146e2595dbcc4917a3ae7b3663b3c

    • SHA1

      3deedba5289f3eddc87cf35c06ba6c6aa1380275

    • SHA256

      abbda9c3353d88c4de9df8880b962fe7958c610cbf54e3e57568af80cd504711

    • SHA512

      43fc0b3687d54dfaecc0a53ce290c59ba4b35540b0348f28edede81fd8e96888dabe7c008eb0d1d8d4fd23c76ace1ff570dd9175695f25a5aaad055f1dfc0d69

    • SSDEEP

      6144:Nvd0m3MKiQr/B49UXhtjKzGLCrR8A5ZpKkUuf/nVo9v1LIMyXiBqpMoZInOrGPuB:j1F/BkURZdiL7UInV8xIbXolwCO6xu

    Score
    N/A

MITRE ATT&CK Matrix

Tasks