General

  • Target

    955afeef640a6f5b60a086a6aead06e48277fba9d070997ba3d2a52a5e67d04e.bin

  • Size

    3.7MB

  • Sample

    241217-1zlbys1kep

  • MD5

    d58d219972f17bb294f45f5a4b8e2ece

  • SHA1

    d108988a2b621de10fe4c3400417368760dda771

  • SHA256

    955afeef640a6f5b60a086a6aead06e48277fba9d070997ba3d2a52a5e67d04e

  • SHA512

    65a83742b04b37e69c841e643557234ff38223571fa74ea0ff8cf7368d73718c83c4e79831b543fa24de53ab37270d34aab9dd482c5a4c0211757b56a6c0d718

  • SSDEEP

    98304:B1y8VfJXnGiJJuKFvD78msuex8dE1MrCVwLkci5jq:Py8VxXnGiXuKFnoaOurCokcwjq

Malware Config

Targets

    • Target

      955afeef640a6f5b60a086a6aead06e48277fba9d070997ba3d2a52a5e67d04e.bin

    • Size

      3.7MB

    • MD5

      d58d219972f17bb294f45f5a4b8e2ece

    • SHA1

      d108988a2b621de10fe4c3400417368760dda771

    • SHA256

      955afeef640a6f5b60a086a6aead06e48277fba9d070997ba3d2a52a5e67d04e

    • SHA512

      65a83742b04b37e69c841e643557234ff38223571fa74ea0ff8cf7368d73718c83c4e79831b543fa24de53ab37270d34aab9dd482c5a4c0211757b56a6c0d718

    • SSDEEP

      98304:B1y8VfJXnGiJJuKFvD78msuex8dE1MrCVwLkci5jq:Py8VxXnGiXuKFnoaOurCokcwjq

    Score
    7/10
    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Mobile v15

Tasks