General

  • Target

    7221820610ce7caa1ec63b69e3d00331

  • Size

    5.4MB

  • Sample

    240124-npd4nshca5

  • MD5

    7221820610ce7caa1ec63b69e3d00331

  • SHA1

    1275479164fb175cd27c1368346169aaa9de648c

  • SHA256

    ddeb26152cf346555d6323bf562438544a35eb5a70e523bf41a2b1f65a4f65c8

  • SHA512

    d57c39a9b0a3d42043425b61d364baff42cb5abae9e855a23dfba8accaf25cc150453c22d0414d64708d588cd4391b402ca947e29131e8f9525aeb90befd3405

  • SSDEEP

    98304:zlH+AMSxQrZf1bjvB86RRIYomcA6prm9yeX8JVYpqTgHQL6BR72eTw72w:ZeAkf1bNRymcJpq9BXwgwL6DSeuZ

Score
8/10

Malware Config

Targets

    • Target

      7221820610ce7caa1ec63b69e3d00331

    • Size

      5.4MB

    • MD5

      7221820610ce7caa1ec63b69e3d00331

    • SHA1

      1275479164fb175cd27c1368346169aaa9de648c

    • SHA256

      ddeb26152cf346555d6323bf562438544a35eb5a70e523bf41a2b1f65a4f65c8

    • SHA512

      d57c39a9b0a3d42043425b61d364baff42cb5abae9e855a23dfba8accaf25cc150453c22d0414d64708d588cd4391b402ca947e29131e8f9525aeb90befd3405

    • SSDEEP

      98304:zlH+AMSxQrZf1bjvB86RRIYomcA6prm9yeX8JVYpqTgHQL6BR72eTw72w:ZeAkf1bNRymcJpq9BXwgwL6DSeuZ

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks