General

  • Target

    5889135382528000.zip

  • Size

    1.7MB

  • Sample

    210729-smfb1mgcn6

  • MD5

    270b020802faac45c41bd7fe719d2474

  • SHA1

    05bfae87895ba5508373d4637bf00311bfb92fab

  • SHA256

    50eb5efda216e461fb9e08b542f317f570f107a4dbbc2883f1ea341cbb7535a6

  • SHA512

    22f3b7ff09e5151e8d4d532025bcd21e346e0c412c32c88f28af0142f56efe56ad4348635fe624c1e0e617219a96fa039137415347d7d743709339c2a58fa7fc

Malware Config

Targets

    • Target

      6598f6a0ff01e0804ba14d4dd850fee41b7f5bd6b6c2b8e5ce50453f25f7ab27

    • Size

      2.0MB

    • MD5

      ce50efbae27ce1e42382c46e41ddc819

    • SHA1

      fc4cbca878da64f71a997ea3441f6727a1b04a06

    • SHA256

      6598f6a0ff01e0804ba14d4dd850fee41b7f5bd6b6c2b8e5ce50453f25f7ab27

    • SHA512

      c6d1bc1e52cc15bc0a55f97ae8e0ea7a8427bd5b6c41103d35e193eb37299f21358ddd3c296913742e257dec129f6b584b144fd0446f06c8d58312573799ca48

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks