General

  • Target

    5024f0a56ab2a32bc149ebd9a840960c

  • Size

    22.2MB

  • Sample

    240110-kxq7esdcg5

  • MD5

    5024f0a56ab2a32bc149ebd9a840960c

  • SHA1

    e13661d4e6f419ee807b61c353291d88c76251ac

  • SHA256

    a3ba11b1bd8922cd965e1c18c831d73ffed8ad72f59c5b76c18711b556aa7d05

  • SHA512

    d07744ad4b5c5165f18b61946b10cc86a7e05d211e5aa63351547f2dfb30a5b502665d59f9f78c6d1fcaa2bff0a50ad5adae4304c702ab9585522d0a388f84e6

  • SSDEEP

    393216:YaUS+6c0uifK4FYAQ5j5gah4ndKXW5ckls6LquGvxKqg7MSo5SX8P/mHc16wpzF3:v91ii3aAQ5j5g4EdKG5s6LBqgqSMGHc7

Score
8/10

Malware Config

Targets

    • Target

      5024f0a56ab2a32bc149ebd9a840960c

    • Size

      22.2MB

    • MD5

      5024f0a56ab2a32bc149ebd9a840960c

    • SHA1

      e13661d4e6f419ee807b61c353291d88c76251ac

    • SHA256

      a3ba11b1bd8922cd965e1c18c831d73ffed8ad72f59c5b76c18711b556aa7d05

    • SHA512

      d07744ad4b5c5165f18b61946b10cc86a7e05d211e5aa63351547f2dfb30a5b502665d59f9f78c6d1fcaa2bff0a50ad5adae4304c702ab9585522d0a388f84e6

    • SSDEEP

      393216:YaUS+6c0uifK4FYAQ5j5gah4ndKXW5ckls6LquGvxKqg7MSo5SX8P/mHc16wpzF3:v91ii3aAQ5j5g4EdKG5s6LBqgqSMGHc7

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks