General

  • Target

    f8efea4d21ecad1d12bf865939f9341f51bcae435d6db3a77c7c3a2913ec4312

  • Size

    24.1MB

  • Sample

    231224-js4fhsbcap

  • MD5

    35d17b3bc415f96b685adeb3e6687cb1

  • SHA1

    35ce830eda336399bf8fd4ab9d884657614c26cc

  • SHA256

    f8efea4d21ecad1d12bf865939f9341f51bcae435d6db3a77c7c3a2913ec4312

  • SHA512

    dc709e27e4200cd8853f3257d7b2d742733645fc29a018d97f2b402ad132a44f61bdf0bc3c371692a0eb991074d85b3a2f48131e8b3a8242f0225041e0c2adc8

  • SSDEEP

    786432:hhyzOAlBaIkbm4LoZ5kVsX1xCe7sZs/BQXx:GznBaIxZceTCeDJWx

Score
8/10

Malware Config

Targets

    • Target

      f8efea4d21ecad1d12bf865939f9341f51bcae435d6db3a77c7c3a2913ec4312

    • Size

      24.1MB

    • MD5

      35d17b3bc415f96b685adeb3e6687cb1

    • SHA1

      35ce830eda336399bf8fd4ab9d884657614c26cc

    • SHA256

      f8efea4d21ecad1d12bf865939f9341f51bcae435d6db3a77c7c3a2913ec4312

    • SHA512

      dc709e27e4200cd8853f3257d7b2d742733645fc29a018d97f2b402ad132a44f61bdf0bc3c371692a0eb991074d85b3a2f48131e8b3a8242f0225041e0c2adc8

    • SSDEEP

      786432:hhyzOAlBaIkbm4LoZ5kVsX1xCe7sZs/BQXx:GznBaIxZceTCeDJWx

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks