General

  • Target

    f34fad9a1967983d7b5a461bcd757439f16a0701a9e98a47fcaa8764057af3bb

  • Size

    11.0MB

  • Sample

    231224-jd9zraagfj

  • MD5

    60165fb112f9a7034ca709179e9c48dc

  • SHA1

    0ded76e27cb65362a79b3abc03cded697c0f7529

  • SHA256

    f34fad9a1967983d7b5a461bcd757439f16a0701a9e98a47fcaa8764057af3bb

  • SHA512

    8f94b2d28f44098b340980ca99a2197004683c38de7c4f0252f20545d3595850c278f04761330553fe1a91a09cc49293398bb83ed270762eef184978512283bc

  • SSDEEP

    196608:KwhyAW9uZzqaQqNrI6KHEEgDtpH84PQ9A2hFqJsNw5TI51QbN+bsYozMG/NfdwHB:5hy7uZmyZIEEg5pUACqsNw5Tq1Qb0m18

Score
8/10

Malware Config

Targets

    • Target

      f34fad9a1967983d7b5a461bcd757439f16a0701a9e98a47fcaa8764057af3bb

    • Size

      11.0MB

    • MD5

      60165fb112f9a7034ca709179e9c48dc

    • SHA1

      0ded76e27cb65362a79b3abc03cded697c0f7529

    • SHA256

      f34fad9a1967983d7b5a461bcd757439f16a0701a9e98a47fcaa8764057af3bb

    • SHA512

      8f94b2d28f44098b340980ca99a2197004683c38de7c4f0252f20545d3595850c278f04761330553fe1a91a09cc49293398bb83ed270762eef184978512283bc

    • SSDEEP

      196608:KwhyAW9uZzqaQqNrI6KHEEgDtpH84PQ9A2hFqJsNw5TI51QbN+bsYozMG/NfdwHB:5hy7uZmyZIEEg5pUACqsNw5Tq1Qb0m18

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks