General

  • Target

    65071956f9085a9d5b21f48e7f19fd06

  • Size

    1.2MB

  • Sample

    240118-k76d4ahbg3

  • MD5

    65071956f9085a9d5b21f48e7f19fd06

  • SHA1

    91211d0744b3b4bc4d22ddf4516bea3c8636e69e

  • SHA256

    848accc5a89ce2dd9ac46de0b09116f354c1d8c7b068cd73a5875c231c49e8b7

  • SHA512

    42fbce25abc7b222dacd4309d36964d49b179d6995c6b1189ad05cc95944948657ae925d402bd1efc2d20988facfa66c6085e7328fd14534984d06fe0adbf373

  • SSDEEP

    24576:TQlPY809YnU/YRmeEnnolkndsOWoyjE60tATaERREaJRoHUYnmZQ/2SmX5a:TQlQ80yU/pejudXKE3AOwEasHnnmZQUA

Score
8/10

Malware Config

Targets

    • Target

      65071956f9085a9d5b21f48e7f19fd06

    • Size

      1.2MB

    • MD5

      65071956f9085a9d5b21f48e7f19fd06

    • SHA1

      91211d0744b3b4bc4d22ddf4516bea3c8636e69e

    • SHA256

      848accc5a89ce2dd9ac46de0b09116f354c1d8c7b068cd73a5875c231c49e8b7

    • SHA512

      42fbce25abc7b222dacd4309d36964d49b179d6995c6b1189ad05cc95944948657ae925d402bd1efc2d20988facfa66c6085e7328fd14534984d06fe0adbf373

    • SSDEEP

      24576:TQlPY809YnU/YRmeEnnolkndsOWoyjE60tATaERREaJRoHUYnmZQ/2SmX5a:TQlQ80yU/pejudXKE3AOwEasHnnmZQUA

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      __pasys_remote_banner.jar

    • Size

      114KB

    • MD5

      2ad9fb4b2d9b333883b7e38f61c2fd2f

    • SHA1

      5b85041452d173ed0d81d25b9ca78608a998e328

    • SHA256

      b9310a99f1b60959f6b725eea74623dc491adec55da740c17e8c7e02f35818f5

    • SHA512

      6fc04e1e22ebf8920b4928a8086cf3e0814d155f79f80d71622916f6a0911262382710e5ee2acea653db4b387730e201134592cb9992b14f3aef8b09d83bda90

    • SSDEEP

      3072:9cU7bD2h2Z5ecVpoj8eVJBl52Dx9yW0jv2gspIn:m8n28Z5eAs8S73InyWmug9

    Score
    1/10

MITRE ATT&CK Matrix

Tasks