General

  • Target

    ec70b1f4440d3341aea47e6735980d10371a76243dcb8f482e84a46be7ae8935

  • Size

    12.4MB

  • Sample

    231224-hpy6ysaafm

  • MD5

    b0b51bbf3a1e824232e26761fa60a307

  • SHA1

    4099d9361c9e80533304e8d32b011a7bffbc050a

  • SHA256

    ec70b1f4440d3341aea47e6735980d10371a76243dcb8f482e84a46be7ae8935

  • SHA512

    0db130fdd9ae90a4138a03a0902127f7c90c184215f4d62b8fc18b6a5749978a5dad035f7f66ea90218d2d6f2c052a09814ca0f16a4592cf67880599706d2214

  • SSDEEP

    196608:DJoSBMNY2dZxPuWGWt7QrjA0MGL6sWuteELxmZGhQlyF/15Fmk1APDQsJLb/MHy2:DJRBGYYXuE74AG6sJnmZiQobrO3/44k

Score
8/10

Malware Config

Targets

    • Target

      ec70b1f4440d3341aea47e6735980d10371a76243dcb8f482e84a46be7ae8935

    • Size

      12.4MB

    • MD5

      b0b51bbf3a1e824232e26761fa60a307

    • SHA1

      4099d9361c9e80533304e8d32b011a7bffbc050a

    • SHA256

      ec70b1f4440d3341aea47e6735980d10371a76243dcb8f482e84a46be7ae8935

    • SHA512

      0db130fdd9ae90a4138a03a0902127f7c90c184215f4d62b8fc18b6a5749978a5dad035f7f66ea90218d2d6f2c052a09814ca0f16a4592cf67880599706d2214

    • SSDEEP

      196608:DJoSBMNY2dZxPuWGWt7QrjA0MGL6sWuteELxmZGhQlyF/15Fmk1APDQsJLb/MHy2:DJRBGYYXuE74AG6sJnmZiQobrO3/44k

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      clean_robot.apk

    • Size

      138KB

    • MD5

      4b31ed065618d2553b64c83127ecf698

    • SHA1

      aa5cee4147e90c362e9f1e804f31af06cffd60c7

    • SHA256

      0ef662cefa04b69c128212edb3847a0b14876a52cd4175527c9489f87d0136cf

    • SHA512

      6febfe8d2ad16ded31439917775e2a032bfe3d01b1bb37461d3c104faeaa978fe5d771af5b845777575ace8007a0bd8bbc823314c41c0e4aec089209ee5c3fe6

    • SSDEEP

      3072:/5DT5xLlH4v9tmgcn6sQfqCeqR6Z188nWFcFXq80:/5DT/LlHQggK6heqR6IyCcF0

    Score
    4/10

MITRE ATT&CK Matrix

Tasks