General

  • Target

    1ba121478f8c511840f4cbe316abfc68

  • Size

    24.5MB

  • Sample

    231230-y1q8gscdbp

  • MD5

    1ba121478f8c511840f4cbe316abfc68

  • SHA1

    eafad4e2e7a15b3a37701886e45bd7b91a0ac3ce

  • SHA256

    ee2a06a5edd015b9d769fdd8a15b876ac6842ef129a57348c4c15c6984b7dc71

  • SHA512

    4e870a7f73812a42898a8d2c000a976397f48d84c4349202a1491f5cc67105e6cdeb9d424ecfa4a9b7b90ac76c9aac7571ddca6cb1d2064bed5130e95ea6f014

  • SSDEEP

    786432:V8BTgQhTdl1vMzNtzVZ3Cxstb+DBGRswd:VqTjZ7aNtzyxqb+sh

Score
8/10

Malware Config

Targets

    • Target

      1ba121478f8c511840f4cbe316abfc68

    • Size

      24.5MB

    • MD5

      1ba121478f8c511840f4cbe316abfc68

    • SHA1

      eafad4e2e7a15b3a37701886e45bd7b91a0ac3ce

    • SHA256

      ee2a06a5edd015b9d769fdd8a15b876ac6842ef129a57348c4c15c6984b7dc71

    • SHA512

      4e870a7f73812a42898a8d2c000a976397f48d84c4349202a1491f5cc67105e6cdeb9d424ecfa4a9b7b90ac76c9aac7571ddca6cb1d2064bed5130e95ea6f014

    • SSDEEP

      786432:V8BTgQhTdl1vMzNtzVZ3Cxstb+DBGRswd:VqTjZ7aNtzyxqb+sh

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks