General

  • Target

    055bf4f099c0f92b4b9126778ef7ee35

  • Size

    23.7MB

  • Sample

    231229-154eqacbbq

  • MD5

    055bf4f099c0f92b4b9126778ef7ee35

  • SHA1

    70ca17b80c2ace67f179ec5e44292abff8761f19

  • SHA256

    43ab7f699e4d4e636d47633b7b887c3f9422a9f4d4fc71743b5ee5b7f354df67

  • SHA512

    26565043bde0434e5847a84a5d8d179a2ca271ad9419b64fd0f72d96b0f0767011ea6014fb1c78aa85526ee14f9d84aa18042c7106f6ef5e7ec2f8437101bc7c

  • SSDEEP

    393216:vQQcUwk3/eg3WW20KFDlamjk9phMs1+rO+T+Mn3CHdkLwTAkWlQTfvPKqb6um3Nf:vFcUw0+WYFDlah9N+rOC+Mn3udkLKzrs

Malware Config

Targets

    • Target

      055bf4f099c0f92b4b9126778ef7ee35

    • Size

      23.7MB

    • MD5

      055bf4f099c0f92b4b9126778ef7ee35

    • SHA1

      70ca17b80c2ace67f179ec5e44292abff8761f19

    • SHA256

      43ab7f699e4d4e636d47633b7b887c3f9422a9f4d4fc71743b5ee5b7f354df67

    • SHA512

      26565043bde0434e5847a84a5d8d179a2ca271ad9419b64fd0f72d96b0f0767011ea6014fb1c78aa85526ee14f9d84aa18042c7106f6ef5e7ec2f8437101bc7c

    • SSDEEP

      393216:vQQcUwk3/eg3WW20KFDlamjk9phMs1+rO+T+Mn3CHdkLwTAkWlQTfvPKqb6um3Nf:vFcUw0+WYFDlah9N+rOC+Mn3udkLKzrs

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks