General

  • Target

    501b894cfc2ea27de0431ed9a564b7b5

  • Size

    6.7MB

  • Sample

    240110-kmj1csdbb7

  • MD5

    501b894cfc2ea27de0431ed9a564b7b5

  • SHA1

    32f85f5e6c5663135c74ce5079219a1b2565cc39

  • SHA256

    fdf5e9c415835b2a1efe888f5020e499f3849b47bdf1569613dc4d087e9d7cc7

  • SHA512

    51aaf568417f914a78aefcfd6636d9ca6192c4998207da463acf66df0766452fbeb4f3d61ce084f4e0a1ed19816d9b32a456c3aa56d3b31a796544accc1bcced

  • SSDEEP

    98304:124NumDF60oOxeZ1ibbpeEeXJHOTZhpSRZhVW2DbUdmsbF615eiKjl:LumD5EHWbpeFXJudhp0V8Qsg15et

Score
8/10

Malware Config

Targets

    • Target

      501b894cfc2ea27de0431ed9a564b7b5

    • Size

      6.7MB

    • MD5

      501b894cfc2ea27de0431ed9a564b7b5

    • SHA1

      32f85f5e6c5663135c74ce5079219a1b2565cc39

    • SHA256

      fdf5e9c415835b2a1efe888f5020e499f3849b47bdf1569613dc4d087e9d7cc7

    • SHA512

      51aaf568417f914a78aefcfd6636d9ca6192c4998207da463acf66df0766452fbeb4f3d61ce084f4e0a1ed19816d9b32a456c3aa56d3b31a796544accc1bcced

    • SSDEEP

      98304:124NumDF60oOxeZ1ibbpeEeXJHOTZhpSRZhVW2DbUdmsbF615eiKjl:LumD5EHWbpeFXJudhp0V8Qsg15et

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks