General

  • Target

    15113716445.zip

  • Size

    12.7MB

  • Sample

    240216-vhpedsde4z

  • MD5

    09eec61c381eb4ea6b6d35b05a03c813

  • SHA1

    78922ed92685306152f1d5767adf09e71945fe5c

  • SHA256

    80e3ad58add9a708dfbc24f67faa9472c57d95c6de6808de2ceda5db31c7ef78

  • SHA512

    d2b06b6ca2ac7ad21b27947d253e2b964fa528aa73783c8765127c23108d0630ca852dbb484d85ccb331e23e1228b365fbdf5026caad3b8fe6d957123e44447d

  • SSDEEP

    196608:bDhxjsmyTMxrvsfv1xZdYr1qrxZH9kSlU7waINAiHd9k5xaGuZOog43vVj:JxjHyT/37ZooZdROfCbk/XJzA

Malware Config

Targets

    • Target

      d4701cd54c4e3ccdb639b870592bac25b902b423a8a6d49b902bd16565082980

    • Size

      14.0MB

    • MD5

      d750a3b03f2c123046e00c080d696d61

    • SHA1

      40b12e6f05fe59285efea2965e9ec35fa6f7f44a

    • SHA256

      d4701cd54c4e3ccdb639b870592bac25b902b423a8a6d49b902bd16565082980

    • SHA512

      a0d2c44661e7684849a97fcc33fb3ec1110b89d52a2a6f3cd5fb96f92d4971b1922d9f0e25b642429cdcfc57f7d369b0f9e2ee6b11ee3d6b9c6abc1e84faeff5

    • SSDEEP

      393216:VR/fa9mmImdpEGWomhjartBmv+caO6nAMSghbKsOuN7NL+b9:fim5Q/lmhIXO6nJSibKsOuN7NKb9

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks