General

  • Target

    d9b76e67cc1d53dc996f8ab172874ddfb01d12fe11c54ab50c054029e36093fa

  • Size

    15.3MB

  • Sample

    240318-mbb7gseh9z

  • MD5

    7eaf1e5192c5b196cecd210b9dd12be6

  • SHA1

    548432e56885d653e046a202aea28f6f512ab7c2

  • SHA256

    d9b76e67cc1d53dc996f8ab172874ddfb01d12fe11c54ab50c054029e36093fa

  • SHA512

    150182b1e5540c97a466ad302547610275a7f94b9f6b64cc442a7f6bf3f727fda606c25bc7dc03173ba7bc2e54fb5664450c23eb7a36301000af3a36fe239f4e

  • SSDEEP

    393216:++9ud1jzcNPCyQBIeDof4FNo3psCu9NXnCUnDtpps:++BJ6IBf8EG1MUXps

Malware Config

Targets

    • Target

      d9b76e67cc1d53dc996f8ab172874ddfb01d12fe11c54ab50c054029e36093fa

    • Size

      15.3MB

    • MD5

      7eaf1e5192c5b196cecd210b9dd12be6

    • SHA1

      548432e56885d653e046a202aea28f6f512ab7c2

    • SHA256

      d9b76e67cc1d53dc996f8ab172874ddfb01d12fe11c54ab50c054029e36093fa

    • SHA512

      150182b1e5540c97a466ad302547610275a7f94b9f6b64cc442a7f6bf3f727fda606c25bc7dc03173ba7bc2e54fb5664450c23eb7a36301000af3a36fe239f4e

    • SSDEEP

      393216:++9ud1jzcNPCyQBIeDof4FNo3psCu9NXnCUnDtpps:++BJ6IBf8EG1MUXps

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks