General

  • Target

    4f1bd8e32bf4d992ba103bbeb571696b

  • Size

    5.7MB

  • Sample

    240110-awpbbsaeam

  • MD5

    4f1bd8e32bf4d992ba103bbeb571696b

  • SHA1

    f57e59dbf62b2a57b2798516019f6794bef1d6ca

  • SHA256

    687eb11ea9be85084154ab83fcddeb274cf8398612f3b092f773da3a9b7906a1

  • SHA512

    be4fb83c5bf1e3aaf23e5a26a88cb559d30ee793bf30186e8d21f793303106399661071f518d336a7af7c7b9446590e8e6b2b0825fe3a338fb33c81231c93a7b

  • SSDEEP

    98304:JtZuaUYa7SHjBxOcawwDUDxvz9GUG2m2BCLzjEEsBQ2aPv1NkPbOx41NQWKsggN:JtcldSHjPtawI8dzg1t5jbsBQnPv1Nkh

Score
8/10

Malware Config

Targets

    • Target

      4f1bd8e32bf4d992ba103bbeb571696b

    • Size

      5.7MB

    • MD5

      4f1bd8e32bf4d992ba103bbeb571696b

    • SHA1

      f57e59dbf62b2a57b2798516019f6794bef1d6ca

    • SHA256

      687eb11ea9be85084154ab83fcddeb274cf8398612f3b092f773da3a9b7906a1

    • SHA512

      be4fb83c5bf1e3aaf23e5a26a88cb559d30ee793bf30186e8d21f793303106399661071f518d336a7af7c7b9446590e8e6b2b0825fe3a338fb33c81231c93a7b

    • SSDEEP

      98304:JtZuaUYa7SHjBxOcawwDUDxvz9GUG2m2BCLzjEEsBQ2aPv1NkPbOx41NQWKsggN:JtcldSHjPtawI8dzg1t5jbsBQnPv1Nkh

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks