General

  • Target

    f6845b6c9bc462c02162ad069caf362021c36f14da912732011c7b570e295c60

  • Size

    26.5MB

  • Sample

    231224-jn22wsddg8

  • MD5

    5bcce599013685a00c09d1a72e4f0f3d

  • SHA1

    035bba14d37ec7ae513b481f3fb2f96bebb7c8d3

  • SHA256

    f6845b6c9bc462c02162ad069caf362021c36f14da912732011c7b570e295c60

  • SHA512

    9e4f452d0d249bf788ccd8562883b56615e2a3c813864f4f1e7a2377236570b6c91af0ef5bd68f7c9a3c4bc7b18f1952607f94a0c80856fad3927ea8e1e4d0a6

  • SSDEEP

    393216:yacFRPrxh1zHrqEAhos4quKYO2UriUNlGZUc514ybOh5ZKZnNieMfw4edrNdlTLk:OFP3UudUOUN+1b6TeM44edRTOsm6QOCx

Score
8/10

Malware Config

Targets

    • Target

      f6845b6c9bc462c02162ad069caf362021c36f14da912732011c7b570e295c60

    • Size

      26.5MB

    • MD5

      5bcce599013685a00c09d1a72e4f0f3d

    • SHA1

      035bba14d37ec7ae513b481f3fb2f96bebb7c8d3

    • SHA256

      f6845b6c9bc462c02162ad069caf362021c36f14da912732011c7b570e295c60

    • SHA512

      9e4f452d0d249bf788ccd8562883b56615e2a3c813864f4f1e7a2377236570b6c91af0ef5bd68f7c9a3c4bc7b18f1952607f94a0c80856fad3927ea8e1e4d0a6

    • SSDEEP

      393216:yacFRPrxh1zHrqEAhos4quKYO2UriUNlGZUc514ybOh5ZKZnNieMfw4edrNdlTLk:OFP3UudUOUN+1b6TeM44edRTOsm6QOCx

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks