General

  • Target

    ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef

  • Size

    13.7MB

  • Sample

    231224-hqlx1saagn

  • MD5

    e40367c5bdc9dd54e4fa558fe0f46fa2

  • SHA1

    57c2bdb41932bc82a6af921e787a0bd7f36cc9f0

  • SHA256

    ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef

  • SHA512

    7619d7c3662915d71cdf4208da51bafb6467e2a1f5b907cd14f89887e4f87ebd733f02ca12368cb4671830c2f6a79c9e5aa495e3b86de765eadb6f0248138bdc

  • SSDEEP

    196608:XsAlINGNyyxXaVuyHA6qY06suhDUNGa2JZiFVtcCx6z8L4TO8QKeBBnTLb7o:XsiNxN6qY0gZiP6fgeOKevnfb8

Score
8/10

Malware Config

Targets

    • Target

      ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef

    • Size

      13.7MB

    • MD5

      e40367c5bdc9dd54e4fa558fe0f46fa2

    • SHA1

      57c2bdb41932bc82a6af921e787a0bd7f36cc9f0

    • SHA256

      ec8d61c2371e36a7b4f8702ff184c1964131b7c140abf5fc1f3cd6046e6439ef

    • SHA512

      7619d7c3662915d71cdf4208da51bafb6467e2a1f5b907cd14f89887e4f87ebd733f02ca12368cb4671830c2f6a79c9e5aa495e3b86de765eadb6f0248138bdc

    • SSDEEP

      196608:XsAlINGNyyxXaVuyHA6qY06suhDUNGa2JZiFVtcCx6z8L4TO8QKeBBnTLb7o:XsiNxN6qY0gZiP6fgeOKevnfb8

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks