General

  • Target

    206db7f5b552136d53d6412e6cbc5d39

  • Size

    16.2MB

  • Sample

    231225-qbtcjshch9

  • MD5

    206db7f5b552136d53d6412e6cbc5d39

  • SHA1

    b681dcf52a9741856e4a289e6e3731fcdb9f9c30

  • SHA256

    a20cbbeb133ede53993cec3757826fa642dbb83a5a8cccd19963def38a77fb00

  • SHA512

    a54efa8c7474ef6c8b84b0ff770fd5ca3e2161505011b93621a2b46b2fb349a757a64833e820d011f28e735dda388c248ba12daa0c15f6e1f786d94d679fbc4c

  • SSDEEP

    196608:YYD6V+U+BBgnla52FOUZJ3ZNMvre2wlN921xPY+HgRUR2Hci9S1dwVZIJIS0jZWr:Y/+dBwa4FnZGOSmd8QgNkEDMOXz0RsJl

Score
8/10

Malware Config

Targets

    • Target

      206db7f5b552136d53d6412e6cbc5d39

    • Size

      16.2MB

    • MD5

      206db7f5b552136d53d6412e6cbc5d39

    • SHA1

      b681dcf52a9741856e4a289e6e3731fcdb9f9c30

    • SHA256

      a20cbbeb133ede53993cec3757826fa642dbb83a5a8cccd19963def38a77fb00

    • SHA512

      a54efa8c7474ef6c8b84b0ff770fd5ca3e2161505011b93621a2b46b2fb349a757a64833e820d011f28e735dda388c248ba12daa0c15f6e1f786d94d679fbc4c

    • SSDEEP

      196608:YYD6V+U+BBgnla52FOUZJ3ZNMvre2wlN921xPY+HgRUR2Hci9S1dwVZIJIS0jZWr:Y/+dBwa4FnZGOSmd8QgNkEDMOXz0RsJl

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks