General

  • Target

    502ba55d85325fb191556cfa8c8b4201

  • Size

    26.4MB

  • Sample

    240110-k529nadec2

  • MD5

    502ba55d85325fb191556cfa8c8b4201

  • SHA1

    58b453f5924b5a0b82a79085357c073002f5dca6

  • SHA256

    403fee1353c5ce52b81d393d0f073e1f8fa3e2e19fca21377958b869e516b21e

  • SHA512

    aca320f63c6cebcc3786449b67d82c6c1c6a0fd199c0314622c256342e0559899e7485f229127bacd84346268d20340bbd753ec42bd0b9f6ee7765a0b3b71e0b

  • SSDEEP

    786432:IsrT7H8aMdKTma8X11TK3UZhiUMKkZhiUMKlC+XRCsk:IkH8tbaGk34A3lA3ijRq

Score
8/10

Malware Config

Targets

    • Target

      502ba55d85325fb191556cfa8c8b4201

    • Size

      26.4MB

    • MD5

      502ba55d85325fb191556cfa8c8b4201

    • SHA1

      58b453f5924b5a0b82a79085357c073002f5dca6

    • SHA256

      403fee1353c5ce52b81d393d0f073e1f8fa3e2e19fca21377958b869e516b21e

    • SHA512

      aca320f63c6cebcc3786449b67d82c6c1c6a0fd199c0314622c256342e0559899e7485f229127bacd84346268d20340bbd753ec42bd0b9f6ee7765a0b3b71e0b

    • SSDEEP

      786432:IsrT7H8aMdKTma8X11TK3UZhiUMKkZhiUMKlC+XRCsk:IkH8tbaGk34A3lA3ijRq

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      amap_resource1_0_0.png

    • Size

      24KB

    • MD5

      94a2a5f84a3fd6f0fd9134708ae1b81e

    • SHA1

      1e21afaa48ed86cb31aaf7b17c3514315364cc99

    • SHA256

      fc0c21884d4edfa4d93282139a309f204b27271a111a5b158edbc048f730b461

    • SHA512

      24a175d15cb5cf8d23f0d53b004ed5c9a47646129c816fcae1b46aedabd95bb2c6dd2958d39d6f98f36dec3cd55d6af2d9b8f7013ced4b37a30db566e9a44923

    • SSDEEP

      384:SevEWnTSCwukBdJ4dVCHyP7MPi3oqYXgnJk:3vEWnSue4+Sf3opQa

    Score
    1/10

MITRE ATT&CK Matrix

Tasks