General

  • Target

    0d259dcb39e18fbc5d95ffc6159a6fd8

  • Size

    18.6MB

  • Sample

    231230-d52jssddcq

  • MD5

    0d259dcb39e18fbc5d95ffc6159a6fd8

  • SHA1

    1c6cb440c6aaa0685e608849565e46f7b7148aaa

  • SHA256

    79c0fbef66d854aff091426a13d36c18e9a3753b3eb6050c77e981ee3342b211

  • SHA512

    6f7c05f5fe6eb57e9448df2eb66a5d68db0d7c95b596c8f2fb53d96ee008c70fcaa95a440041e6a74118f56f3b29dedaf454b52c76cb98d96b94bdee2e3e8c50

  • SSDEEP

    393216:3oSOik2jckcip4n6r+aXinjEw/zuaLp8m+ifOkwIl39OggUqa:YT2jck3466adOp8j+lN73

Score
8/10

Malware Config

Targets

    • Target

      0d259dcb39e18fbc5d95ffc6159a6fd8

    • Size

      18.6MB

    • MD5

      0d259dcb39e18fbc5d95ffc6159a6fd8

    • SHA1

      1c6cb440c6aaa0685e608849565e46f7b7148aaa

    • SHA256

      79c0fbef66d854aff091426a13d36c18e9a3753b3eb6050c77e981ee3342b211

    • SHA512

      6f7c05f5fe6eb57e9448df2eb66a5d68db0d7c95b596c8f2fb53d96ee008c70fcaa95a440041e6a74118f56f3b29dedaf454b52c76cb98d96b94bdee2e3e8c50

    • SSDEEP

      393216:3oSOik2jckcip4n6r+aXinjEw/zuaLp8m+ifOkwIl39OggUqa:YT2jck3466adOp8j+lN73

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks Android system properties for emulator presence.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks