General

  • Target

    f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065

  • Size

    16.0MB

  • Sample

    231224-jbdtjadae4

  • MD5

    c088ca801cf91e678b8d5f6eee26ab36

  • SHA1

    4959bd44fe9ad2c5933538c9f3c5cbe09383d929

  • SHA256

    f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065

  • SHA512

    cd989f8d239743deafee227c1c93d3296c66341402f8b71c86be30e77911b84d504df2363910e12bc399db8b7cb34fafcd826e245adbdffa96d13cc0123f6a92

  • SSDEEP

    393216:/+84G56McFldVGX3fX6W1oQRddrI9nbEI8WQzhRcem:/55rcF90fX6WCMKiNRE

Score
8/10

Malware Config

Targets

    • Target

      f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065

    • Size

      16.0MB

    • MD5

      c088ca801cf91e678b8d5f6eee26ab36

    • SHA1

      4959bd44fe9ad2c5933538c9f3c5cbe09383d929

    • SHA256

      f27d84201abd752ddb4532bd901c5cfa0b5ca5e9c698c4a7c91373c5dc199065

    • SHA512

      cd989f8d239743deafee227c1c93d3296c66341402f8b71c86be30e77911b84d504df2363910e12bc399db8b7cb34fafcd826e245adbdffa96d13cc0123f6a92

    • SSDEEP

      393216:/+84G56McFldVGX3fX6W1oQRddrI9nbEI8WQzhRcem:/55rcF90fX6WCMKiNRE

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks