General

  • Target

    3e49bcfc58defb6077e9661cadaa458c

  • Size

    20.7MB

  • Sample

    240102-spm4ssbac9

  • MD5

    3e49bcfc58defb6077e9661cadaa458c

  • SHA1

    32021fe4bd5dd0f656e1f39aa60425f31e95d77d

  • SHA256

    f89ef57c7df0a0fa0c323efeb13e063712ee3512c05ba9d40dff7fc20539fa04

  • SHA512

    d9f2ffbcf412d8e84a6d7b3c77d5c91e40c7363c2730d36361be7e8a79afd1b1e6221207192762a2d9dbfe79ddc4dd81686b3c9b660e1c2cc0660781c73e491d

  • SSDEEP

    393216:DX0l36NVqLplXEm9fyf/PnRQ7MjQz9PkTfnnOSjWebvr7LV1qG/RxrOJEz:DX+yqLplXEm9fyvRQ7UQzmfnOSVDzOGz

Malware Config

Targets

    • Target

      3e49bcfc58defb6077e9661cadaa458c

    • Size

      20.7MB

    • MD5

      3e49bcfc58defb6077e9661cadaa458c

    • SHA1

      32021fe4bd5dd0f656e1f39aa60425f31e95d77d

    • SHA256

      f89ef57c7df0a0fa0c323efeb13e063712ee3512c05ba9d40dff7fc20539fa04

    • SHA512

      d9f2ffbcf412d8e84a6d7b3c77d5c91e40c7363c2730d36361be7e8a79afd1b1e6221207192762a2d9dbfe79ddc4dd81686b3c9b660e1c2cc0660781c73e491d

    • SSDEEP

      393216:DX0l36NVqLplXEm9fyf/PnRQ7MjQz9PkTfnnOSjWebvr7LV1qG/RxrOJEz:DX+yqLplXEm9fyvRQ7UQzmfnOSVDzOGz

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Acquires the wake lock

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks