General

  • Target

    561c9253d3d47c2e2bb1b7a2944a6974

  • Size

    22.4MB

  • Sample

    240112-lnxtaadebp

  • MD5

    561c9253d3d47c2e2bb1b7a2944a6974

  • SHA1

    e36ecc112fc0e92be3e58c63759f330de6603ad8

  • SHA256

    5aa94c0d6e4e8aaa2482692ada9d8129f2e03cbe04a371225a899a43835587b2

  • SHA512

    7aaed3a1930c5298a59b02ed5caf0ff5bec59220307aec138f5045ad1ffd80b665a800e331af99af8f728f4033ca6a5e5d86212e2cdfcc47f665417c65cbef0d

  • SSDEEP

    393216:/VA7ckaswvk7n941MHKZ2KpkIGL2YayZKUAsEMqbhse459UUX6INgNMD2iJO:/VA7ckNws792MHKtpk5LVAsp1e45Z6EY

Malware Config

Targets

    • Target

      561c9253d3d47c2e2bb1b7a2944a6974

    • Size

      22.4MB

    • MD5

      561c9253d3d47c2e2bb1b7a2944a6974

    • SHA1

      e36ecc112fc0e92be3e58c63759f330de6603ad8

    • SHA256

      5aa94c0d6e4e8aaa2482692ada9d8129f2e03cbe04a371225a899a43835587b2

    • SHA512

      7aaed3a1930c5298a59b02ed5caf0ff5bec59220307aec138f5045ad1ffd80b665a800e331af99af8f728f4033ca6a5e5d86212e2cdfcc47f665417c65cbef0d

    • SSDEEP

      393216:/VA7ckaswvk7n941MHKZ2KpkIGL2YayZKUAsEMqbhse459UUX6INgNMD2iJO:/VA7ckNws792MHKtpk5LVAsp1e45Z6EY

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

    • Target

      bdxadsdk.jar

    • Size

      122KB

    • MD5

      5f8b275fedec9d556fe85c3e99bdbf3f

    • SHA1

      8698176efe28ff997b0804a2645506729124d36a

    • SHA256

      bc40554dbc122cc0413c5e81aa461a6008a39346f0e4c0ec0d4f03cedf08842b

    • SHA512

      68c4c7d9f786d18c93df1315b8342b080c913feb966d618d52ba447627a427c9ad5a63fcd1f7c3056897fc547c85c10be44c14553f9ea5f7f12140326b0e6e02

    • SSDEEP

      3072:sezl3BJMKYBFWh2zsKWVk56nK25eD/TNro/77ghAIo9t0w6CiG9:lzhMhBFEVkCcy/77aAIo9tM+9

    Score
    1/10
    • Target

      dynamic.jar

    • Size

      107KB

    • MD5

      a727dd82832a284db8f1c7a7d58516cb

    • SHA1

      d7e352e7caea4a621ea0c33d4a1fa2671e85bb24

    • SHA256

      3d5724b187edd11ae0e64c46eea58762decf5c79e25bc1133072013a4aec5be7

    • SHA512

      d08b4aff43e40c935d4540d5d24f441b06a16c6c3b46d81343b63ce805cdfcff9d102a4ce9cd0de6fe4a8e5487158cccd5ff05826a414c38387ea595d2bfa838

    • SSDEEP

      3072:NlkxCE0cUgHvCFp/7cFxw8mU6iupx7JiRwo3nbRwfD9TfJC2NcA:UxV0cJKLjcFxw8d6iMxdiRwKtq9JR

    Score
    1/10
    • Target

      gdtadv2.jar

    • Size

      149KB

    • MD5

      5bbd4987057c6aa8f1992d72206c68a9

    • SHA1

      3a2b6dae68dce8239f680c2684c648238bc1bf36

    • SHA256

      2a7fea6e019debe6a0b0c8a5bff40a0451133d3f122d3bcb8f28aed615c50539

    • SHA512

      ec138779d809f32ffe54998314263546f630fef799bb3cbf61fd494706724a3f756e0b3a5e721765b121a053b56cbe3e39f8edd09c17cae8289d677f9c4b8f73

    • SSDEEP

      3072:s9ECghK7Pic1Oy3c/obh2acQZD8+jb1gUKno8+l7kSVi:sig7KijlbhncQ58CCUKolkSM

    Score
    1/10

MITRE ATT&CK Matrix

Tasks