General

  • Target

    6382941684662272.zip

  • Size

    7.3MB

  • Sample

    210621-vqxkj241tx

  • MD5

    fcdf4d8a9cda7fd8fb1ac16f33dcc5e9

  • SHA1

    cc2ab0c57ceb7c0ac704a685e4dbc53e9b2ef103

  • SHA256

    f9ff002795f2c795f55d073e693be33b7de0d92d594b956e2187f0c58d942634

  • SHA512

    31b517088ef573d4e399fef0c12d6af9458e8f2ea80d5ee28d4e61e32f81fee0024d6c7c437fcc1210b9d212dddf1eeb4003f7f0a7dbcb6caf82042fe9f5b744

Malware Config

Targets

    • Target

      e609ac709a6b80b0ceb58c646735fc597db0483ff637e93acf9be028c07900d7

    • Size

      7.8MB

    • MD5

      31c636b5155f9c6bf71bd5c279947a88

    • SHA1

      7bf98935db59ffbdedf2fc85a6d04901608c85bc

    • SHA256

      e609ac709a6b80b0ceb58c646735fc597db0483ff637e93acf9be028c07900d7

    • SHA512

      5694d4ac85defeb91c63b01d724239eb9207f981d54aeda93b940893bae6f56cddbf28e291130b802cf26f57a27a78dcbb8cbb9d1bde5be0a2121f9c6a902eeb

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks