General

  • Target

    baf5a239bbd450f9a29b0f19fef0d39112adecca584cf224a2a97d50f4cd641e

  • Size

    8.0MB

  • Sample

    240314-lvw6bsbc98

  • MD5

    39bec3e3ea28c2f868f9af3d9108dd98

  • SHA1

    650085b5e87921082031eb2edcb1e8a38720bb71

  • SHA256

    baf5a239bbd450f9a29b0f19fef0d39112adecca584cf224a2a97d50f4cd641e

  • SHA512

    0363523244ec88f769d0399bb943b9cd68618797432dcb3ddd9fa7b70228152e20907bd675d6348d5fe801fad94feebcc6771ec9f901d635aa81b3108581d000

  • SSDEEP

    196608:pCB9zHNMpeRjO31+DsCvghXHHdC5+EfHgaz:pCLNo38sCvR9rz

Malware Config

Targets

    • Target

      baf5a239bbd450f9a29b0f19fef0d39112adecca584cf224a2a97d50f4cd641e

    • Size

      8.0MB

    • MD5

      39bec3e3ea28c2f868f9af3d9108dd98

    • SHA1

      650085b5e87921082031eb2edcb1e8a38720bb71

    • SHA256

      baf5a239bbd450f9a29b0f19fef0d39112adecca584cf224a2a97d50f4cd641e

    • SHA512

      0363523244ec88f769d0399bb943b9cd68618797432dcb3ddd9fa7b70228152e20907bd675d6348d5fe801fad94feebcc6771ec9f901d635aa81b3108581d000

    • SSDEEP

      196608:pCB9zHNMpeRjO31+DsCvghXHHdC5+EfHgaz:pCLNo38sCvR9rz

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks