General

  • Target

    3758743bfde91419f52baafa721bdd3d

  • Size

    10.5MB

  • Sample

    231231-qdzmcaacd8

  • MD5

    3758743bfde91419f52baafa721bdd3d

  • SHA1

    b05bfeb592f24310f41df8295168cdd874ad8836

  • SHA256

    40c3ddf404334612f4160774cb651b7a36bbff0685183a7d3598b6cd3c02b68b

  • SHA512

    79879ec994710e5162578bc0c335baa792bdd73f7258e00b794c6c8883206b965a7cab4f022c753de9833e692460588c85e92699ec170f05dae54f1975ccfec2

  • SSDEEP

    196608:N6vTI6QXjVEKXznB/wYZXuxDA+VhTxO2ex2IpSLF2ktWOg:NXTXjSKjnB/wYZXIdh9AxMF2kFg

Score
8/10

Malware Config

Targets

    • Target

      3758743bfde91419f52baafa721bdd3d

    • Size

      10.5MB

    • MD5

      3758743bfde91419f52baafa721bdd3d

    • SHA1

      b05bfeb592f24310f41df8295168cdd874ad8836

    • SHA256

      40c3ddf404334612f4160774cb651b7a36bbff0685183a7d3598b6cd3c02b68b

    • SHA512

      79879ec994710e5162578bc0c335baa792bdd73f7258e00b794c6c8883206b965a7cab4f022c753de9833e692460588c85e92699ec170f05dae54f1975ccfec2

    • SSDEEP

      196608:N6vTI6QXjVEKXznB/wYZXuxDA+VhTxO2ex2IpSLF2ktWOg:NXTXjSKjnB/wYZXIdh9AxMF2kFg

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks