General

  • Target

    2b832725a72f62a3778a4da5785d1451

  • Size

    17.4MB

  • Sample

    231231-g3qlasdhfp

  • MD5

    2b832725a72f62a3778a4da5785d1451

  • SHA1

    6024582599b35e933181b778618b0c47688d7a4f

  • SHA256

    696be4bca911b4e779fe2a0e1c4742fbd1e33afc4e79824e41850cefdbdf58c1

  • SHA512

    05fd024409147d64467dac0427715a4f20e225a13a58201943c1d71ee90fef5d822cd49e3ccc17fb9173e8d58eb6e76013d354513a88bf6820b11a3f4ce935d8

  • SSDEEP

    393216:U43wIrngF3Uo3L57VTJuo1EX8KC6KnRgzF93gxyVv5/oKyv6azw5:VFnCdrL1khzF9QU5AKyNzw5

Malware Config

Targets

    • Target

      2b832725a72f62a3778a4da5785d1451

    • Size

      17.4MB

    • MD5

      2b832725a72f62a3778a4da5785d1451

    • SHA1

      6024582599b35e933181b778618b0c47688d7a4f

    • SHA256

      696be4bca911b4e779fe2a0e1c4742fbd1e33afc4e79824e41850cefdbdf58c1

    • SHA512

      05fd024409147d64467dac0427715a4f20e225a13a58201943c1d71ee90fef5d822cd49e3ccc17fb9173e8d58eb6e76013d354513a88bf6820b11a3f4ce935d8

    • SSDEEP

      393216:U43wIrngF3Uo3L57VTJuo1EX8KC6KnRgzF93gxyVv5/oKyv6azw5:VFnCdrL1khzF9QU5AKyNzw5

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks