General

  • Target

    245467ce3941e1d774ea21d44524c1cf

  • Size

    9.6MB

  • Sample

    231231-cs8a5sgfe2

  • MD5

    245467ce3941e1d774ea21d44524c1cf

  • SHA1

    f99f98eadf81d5e77b03247bd9b97a555b45ad4d

  • SHA256

    8917cfc1d1039e023a2b6b7528e5451231471979f2efb7e903b7fe61a8c7c88d

  • SHA512

    4dd6c1dab2602fd0fffc84593d27e3aaedd6680091cbac3837df90fc97a483107b07429d9d623303a9b85695eec6b91ca457079fe7b099912b5289f173680ecd

  • SSDEEP

    196608:2/FsSMmTIVi/ifB6lcTIEUHska/U/FwhekRP33Il0BAfctnK:2/FspViqOjEUHva/UJkRv3IlVfcc

Malware Config

Targets

    • Target

      245467ce3941e1d774ea21d44524c1cf

    • Size

      9.6MB

    • MD5

      245467ce3941e1d774ea21d44524c1cf

    • SHA1

      f99f98eadf81d5e77b03247bd9b97a555b45ad4d

    • SHA256

      8917cfc1d1039e023a2b6b7528e5451231471979f2efb7e903b7fe61a8c7c88d

    • SHA512

      4dd6c1dab2602fd0fffc84593d27e3aaedd6680091cbac3837df90fc97a483107b07429d9d623303a9b85695eec6b91ca457079fe7b099912b5289f173680ecd

    • SSDEEP

      196608:2/FsSMmTIVi/ifB6lcTIEUHska/U/FwhekRP33Il0BAfctnK:2/FspViqOjEUHva/UJkRv3IlVfcc

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks