General

  • Target

    5952d3b1e54626b17c7ebc5fcfd788b374f9f36ee125cba011801d93313f1ea2

  • Size

    11.2MB

  • Sample

    240224-mcc56shf3s

  • MD5

    d293661600fc1cd13f47c07c125128c7

  • SHA1

    6c8c67f321e9b2c01429c1fbfe2345a5ddbbcdc3

  • SHA256

    5952d3b1e54626b17c7ebc5fcfd788b374f9f36ee125cba011801d93313f1ea2

  • SHA512

    860962a4d63d470dd4c89eb492f4bf83078480737d49f7654c6455f2585e715b22a7e3b532f5a18d32469815e0a0cff7a28619415fc1a4c90ccd18809692a797

  • SSDEEP

    196608:m1gjh5VfSg6tdSdRYrCy+eOavL3SWpo7h+DsC2ZTUPyPFvOg8:3hoAe2M5uWdsC2ZT8sFO

Malware Config

Targets

    • Target

      5952d3b1e54626b17c7ebc5fcfd788b374f9f36ee125cba011801d93313f1ea2

    • Size

      11.2MB

    • MD5

      d293661600fc1cd13f47c07c125128c7

    • SHA1

      6c8c67f321e9b2c01429c1fbfe2345a5ddbbcdc3

    • SHA256

      5952d3b1e54626b17c7ebc5fcfd788b374f9f36ee125cba011801d93313f1ea2

    • SHA512

      860962a4d63d470dd4c89eb492f4bf83078480737d49f7654c6455f2585e715b22a7e3b532f5a18d32469815e0a0cff7a28619415fc1a4c90ccd18809692a797

    • SSDEEP

      196608:m1gjh5VfSg6tdSdRYrCy+eOavL3SWpo7h+DsC2ZTUPyPFvOg8:3hoAe2M5uWdsC2ZT8sFO

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks