General

  • Target

    6ca3a5abd9ed2fbe646eff5e649bf8df

  • Size

    30.1MB

  • Sample

    231226-n5fx7shcb9

  • MD5

    6ca3a5abd9ed2fbe646eff5e649bf8df

  • SHA1

    c4367ae795fed2a8ddd6dbd9743833523031f4de

  • SHA256

    8cd576ce7a888b087296b4654358a67db5f625fe3dd8664dae67bfc84aaae559

  • SHA512

    a0d477f51c38786a172a51542c1d73038491a0fab511fea20225c86558222fe233821fe7fa26a646865d72e806e99948323a0b6baafb8c25bd7d9870a92133df

  • SSDEEP

    393216:YQs0FwO6hIkbmDahOyq5TPDItjlnPFhDZFOR/WHSUYPMJOd+0SvVlY2KFgaitcuP:dwpOj1+lVF+/WSPcOPArKFgf1PC7J/hs

Score
7/10

Malware Config

Targets

    • Target

      6ca3a5abd9ed2fbe646eff5e649bf8df

    • Size

      30.1MB

    • MD5

      6ca3a5abd9ed2fbe646eff5e649bf8df

    • SHA1

      c4367ae795fed2a8ddd6dbd9743833523031f4de

    • SHA256

      8cd576ce7a888b087296b4654358a67db5f625fe3dd8664dae67bfc84aaae559

    • SHA512

      a0d477f51c38786a172a51542c1d73038491a0fab511fea20225c86558222fe233821fe7fa26a646865d72e806e99948323a0b6baafb8c25bd7d9870a92133df

    • SSDEEP

      393216:YQs0FwO6hIkbmDahOyq5TPDItjlnPFhDZFOR/WHSUYPMJOd+0SvVlY2KFgaitcuP:dwpOj1+lVF+/WSPcOPArKFgf1PC7J/hs

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Target

      box.apk

    • Size

      5.7MB

    • MD5

      9e782803308e7043c96f65c16ca7bc9c

    • SHA1

      7af08384a294db8bcf9b0e1765143c51f4f33958

    • SHA256

      b89220f043c9fab93cdf90ed051c4f601aac64d4ad934f76eb898faa87050a5e

    • SHA512

      536d466fc9c06c41da808d4fafc1ff0e1e1dfa67c8904c47a15eaa7564aa05ebfb2285e49edf30c23f6a784c7389288f3b0fec9ac704eb97b26682257f1c8f72

    • SSDEEP

      98304:t00Qf7nP1LeHc21oDIqNqnyrUT7Vxc9fiR6MmcCPFSG8hH8Sn/pMP4lon0XCJeR:inPJ+FCBqyrCO9rMb+AHFmgloiR

    Score
    6/10
    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks