General

  • Target

    bcf617f7c8af8a1fa42f1cfe1f68353cefe7a6026119c3b318bb2d921c457794

  • Size

    8.1MB

  • Sample

    240313-r5amzafe7w

  • MD5

    4a8535a4c5b8c54740626ad6c8411491

  • SHA1

    837f70935ed09b43704163128c40e4d057e06190

  • SHA256

    bcf617f7c8af8a1fa42f1cfe1f68353cefe7a6026119c3b318bb2d921c457794

  • SHA512

    308b9f3210883f4451db1957dd1a04a67e44a165fa7108266267119e4cc3cad675e90821bec805b5c931137f28a6580a4d99aab2a91b71908c16ad198e503811

  • SSDEEP

    98304:cI5Uopnm4pLoDBA00ta4Vakh7apeRsMuhlv/F2OxPOYsC7Xteooe9vMsYpN4y0Ro:rtJCOC4NMpeRjO3E+DsC7XQsYru61pH

Malware Config

Targets

    • Target

      bcf617f7c8af8a1fa42f1cfe1f68353cefe7a6026119c3b318bb2d921c457794

    • Size

      8.1MB

    • MD5

      4a8535a4c5b8c54740626ad6c8411491

    • SHA1

      837f70935ed09b43704163128c40e4d057e06190

    • SHA256

      bcf617f7c8af8a1fa42f1cfe1f68353cefe7a6026119c3b318bb2d921c457794

    • SHA512

      308b9f3210883f4451db1957dd1a04a67e44a165fa7108266267119e4cc3cad675e90821bec805b5c931137f28a6580a4d99aab2a91b71908c16ad198e503811

    • SSDEEP

      98304:cI5Uopnm4pLoDBA00ta4Vakh7apeRsMuhlv/F2OxPOYsC7Xteooe9vMsYpN4y0Ro:rtJCOC4NMpeRjO3E+DsC7XQsYru61pH

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks