General

  • Target

    bbdc55042e4d772aaf77522764fc62b1

  • Size

    18.3MB

  • Sample

    240309-p6l2aaha51

  • MD5

    bbdc55042e4d772aaf77522764fc62b1

  • SHA1

    cfe56fa045d75f5f816c271e6924bd0cb12bfc89

  • SHA256

    7c6042992097c8e8add806a2d3df2d5fd537e774b052b10fc8003b573e60323e

  • SHA512

    5345d98ba224f62c92b697cfa372728b8605dc26b12ec179883c1521ed6c13cb36f37956321a3349ee7cf3667af06578d1ff34572073835c9f3fea9895d417a0

  • SSDEEP

    393216:D1IQF0MlvSYKYO5/XenzoxM42003u7xaupQ2cYd3kgJ7ZRxn179jva2WD:pIG0oKY1Uuc0+N9bkYn17rWD

Malware Config

Targets

    • Target

      bbdc55042e4d772aaf77522764fc62b1

    • Size

      18.3MB

    • MD5

      bbdc55042e4d772aaf77522764fc62b1

    • SHA1

      cfe56fa045d75f5f816c271e6924bd0cb12bfc89

    • SHA256

      7c6042992097c8e8add806a2d3df2d5fd537e774b052b10fc8003b573e60323e

    • SHA512

      5345d98ba224f62c92b697cfa372728b8605dc26b12ec179883c1521ed6c13cb36f37956321a3349ee7cf3667af06578d1ff34572073835c9f3fea9895d417a0

    • SSDEEP

      393216:D1IQF0MlvSYKYO5/XenzoxM42003u7xaupQ2cYd3kgJ7ZRxn179jva2WD:pIG0oKY1Uuc0+N9bkYn17rWD

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks