General

  • Target

    700bad3a99f8da095ae88f5d2052d01d

  • Size

    8.8MB

  • Sample

    240123-t5azvacfcn

  • MD5

    700bad3a99f8da095ae88f5d2052d01d

  • SHA1

    859cee5f2041703d16c391ebe5832fe5ce860226

  • SHA256

    cae7ce9c81b8a94eb54900563a7f7b8a6cdd282d71920dbf812cb7233e2c9081

  • SHA512

    ba2355ce5865a1c96e88680bbb4289c7ce2ad2d0c336ba62ac60c35679303510b516b3fe28d7f411d6acf5ff88b68d628d529c0137ab61e81b7e391094a4d07c

  • SSDEEP

    196608:KhPkRj/hi4GvqtBAXNOyWU2u/uIG6hV+Ey+cAwiCT7hdeVVw/OwstZoIVXzIlYY:6PyE4GcBBj6h8b+cA0hdeVVw/taZljIp

Score
8/10

Malware Config

Targets

    • Target

      700bad3a99f8da095ae88f5d2052d01d

    • Size

      8.8MB

    • MD5

      700bad3a99f8da095ae88f5d2052d01d

    • SHA1

      859cee5f2041703d16c391ebe5832fe5ce860226

    • SHA256

      cae7ce9c81b8a94eb54900563a7f7b8a6cdd282d71920dbf812cb7233e2c9081

    • SHA512

      ba2355ce5865a1c96e88680bbb4289c7ce2ad2d0c336ba62ac60c35679303510b516b3fe28d7f411d6acf5ff88b68d628d529c0137ab61e81b7e391094a4d07c

    • SSDEEP

      196608:KhPkRj/hi4GvqtBAXNOyWU2u/uIG6hV+Ey+cAwiCT7hdeVVw/OwstZoIVXzIlYY:6PyE4GcBBj6h8b+cA0hdeVVw/taZljIp

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Target

      plugin-deploy.jar

    • Size

      214KB

    • MD5

      394bd5d7d2d595c19a27fa95959efc23

    • SHA1

      1c19442c8f05af69d8cb01b4c0836dc836c66b8f

    • SHA256

      af090825241b7b0c0fab2f6fb72601204fafab385076d3a54c00711a52784e27

    • SHA512

      ef9b2484f0e02c6d53ce76b4daf0182406fe72674bf051abdfd8f5148805342c5468a48d92eba5ebee3172cb546907a09b9e731f6b60e762394514f8e56aef82

    • SSDEEP

      3072:73CqvRecM1MPRW7mDODDMERFQHu9RridcgCnkCj+Sqi0uMFSHubErMoUcUSF2o:LlJJZi9LQHZdqq5uMFIubEwElFr

    Score
    1/10

MITRE ATT&CK Matrix

Tasks