General

  • Target

    53e7e33ddba4d732327f350b46ffe466

  • Size

    21.3MB

  • Sample

    231226-e1s8asefa7

  • MD5

    53e7e33ddba4d732327f350b46ffe466

  • SHA1

    74a9d93dc5230abf1156b17fe96d73137d644bc4

  • SHA256

    1a1f9d3a756cf58061df0b106a272777cfd07f393f8733794f171cbc751e7781

  • SHA512

    d95a030f586f51cbb6a322abb0ccd3ce90f79863464f61aa085ed7ca90136ddd7a2244714cb2d5e652de2cfc97ff74ab29fd60dff207650c39ea3eab8d3ea5ae

  • SSDEEP

    393216:akgapbGplDrRVclilzVdP7ybL4nU2LRGOcTR0reqijuc:a+cDVPXO0UsgqCqiL

Score
8/10

Malware Config

Targets

    • Target

      53e7e33ddba4d732327f350b46ffe466

    • Size

      21.3MB

    • MD5

      53e7e33ddba4d732327f350b46ffe466

    • SHA1

      74a9d93dc5230abf1156b17fe96d73137d644bc4

    • SHA256

      1a1f9d3a756cf58061df0b106a272777cfd07f393f8733794f171cbc751e7781

    • SHA512

      d95a030f586f51cbb6a322abb0ccd3ce90f79863464f61aa085ed7ca90136ddd7a2244714cb2d5e652de2cfc97ff74ab29fd60dff207650c39ea3eab8d3ea5ae

    • SSDEEP

      393216:akgapbGplDrRVclilzVdP7ybL4nU2LRGOcTR0reqijuc:a+cDVPXO0UsgqCqiL

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      gdtadv2.jar

    • Size

      1.2MB

    • MD5

      662214e53416cc2f6786373345526786

    • SHA1

      da86e4dcc4290ad616259a635c7b01741a733109

    • SHA256

      fd36e3e8fa5771e48b8fa2f3d9abb4cdea15983bafabcb6bbc6fe8a5bb3676b6

    • SHA512

      55feb6c3973a8a96573952cb95b95eb9fd9420e80d305dc592bc42e01742fdfc76cfe0e8e44fa8e1b2b0e5620c99aed701632cd44ff2f798ba42b4d773c91177

    • SSDEEP

      24576:9eGqTvtl7F7Qj7DiSkKoPRlUMGZNHc1Llm06poH1iKbncR/nd2Z8:QGqDF+7DiSGw7CLlV2mIKbcR/ndm8

    Score
    1/10

MITRE ATT&CK Matrix

Tasks