General

  • Target

    0a247679972c3c0bb9286b15e47df85dda1a3b46e889b2a31feed0582aa6d242

  • Size

    11.6MB

  • Sample

    240227-xvj2jshb29

  • MD5

    83534c5d9f5e5f00c5b569d926d026cb

  • SHA1

    707097dd0e974a8b719493c13ed760105bad1c0a

  • SHA256

    0a247679972c3c0bb9286b15e47df85dda1a3b46e889b2a31feed0582aa6d242

  • SHA512

    1209038b5463d1d06d3fabb28316a640f17cfa82293c19a52eedc5b9a3568c225f915c1c7047c9e83992b38b76e24540a3ef0d5e42aec76d9148d026e1ae39c6

  • SSDEEP

    196608:rC+DsC6NMpeRjO3gyFPeimQ2K7HjIydNPRqwTqc83NV39NrQTOVtUjTcDe:rlsC6No3Z7Hcqz74ZbAcCx

Malware Config

Targets

    • Target

      0a247679972c3c0bb9286b15e47df85dda1a3b46e889b2a31feed0582aa6d242

    • Size

      11.6MB

    • MD5

      83534c5d9f5e5f00c5b569d926d026cb

    • SHA1

      707097dd0e974a8b719493c13ed760105bad1c0a

    • SHA256

      0a247679972c3c0bb9286b15e47df85dda1a3b46e889b2a31feed0582aa6d242

    • SHA512

      1209038b5463d1d06d3fabb28316a640f17cfa82293c19a52eedc5b9a3568c225f915c1c7047c9e83992b38b76e24540a3ef0d5e42aec76d9148d026e1ae39c6

    • SSDEEP

      196608:rC+DsC6NMpeRjO3gyFPeimQ2K7HjIydNPRqwTqc83NV39NrQTOVtUjTcDe:rlsC6No3Z7Hcqz74ZbAcCx

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks