General

  • Target

    1fc4e23b790c842377a45500d6d37435

  • Size

    3.9MB

  • Sample

    231230-3ajsyabeeq

  • MD5

    1fc4e23b790c842377a45500d6d37435

  • SHA1

    3b304637795d2babb8c1f90764e86a50cd55ae63

  • SHA256

    a27099417b543a21212b81fe305ee9e4171848d77dac5f58286fad638b7af8ac

  • SHA512

    e41334749f51edccf00f23e469d650a865fe8eeafb3a22520f90f490253fa2720d2a4fea6342fea0f614689e82b5737d3f00af8e463d3ea18427d57eed97524e

  • SSDEEP

    98304:vHMkXc+2W7jEKOe8aZmrYxE56WsbJfLvtx6PjzMaj/WRCSjx3CfNpVYTh6JdXlZ8:vHMk6W7vOLaArkWmp3kjzMaj/WRCSjx7

Score
8/10

Malware Config

Targets

    • Target

      1fc4e23b790c842377a45500d6d37435

    • Size

      3.9MB

    • MD5

      1fc4e23b790c842377a45500d6d37435

    • SHA1

      3b304637795d2babb8c1f90764e86a50cd55ae63

    • SHA256

      a27099417b543a21212b81fe305ee9e4171848d77dac5f58286fad638b7af8ac

    • SHA512

      e41334749f51edccf00f23e469d650a865fe8eeafb3a22520f90f490253fa2720d2a4fea6342fea0f614689e82b5737d3f00af8e463d3ea18427d57eed97524e

    • SSDEEP

      98304:vHMkXc+2W7jEKOe8aZmrYxE56WsbJfLvtx6PjzMaj/WRCSjx3CfNpVYTh6JdXlZ8:vHMk6W7vOLaArkWmp3kjzMaj/WRCSjx7

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks