General

  • Target

    6073975339909120.zip

  • Size

    1.7MB

  • Sample

    210729-vs9kpag7qa

  • MD5

    b117e6dea1d9616df6263e1bf0c34e7f

  • SHA1

    0c150914cc44edffbd9ee04c5cac9c742fcf7a23

  • SHA256

    5d39beb27dfbadaa4e905d9301d017492ee132361d1099544829dc2cbbb0849a

  • SHA512

    1890f4b8744f4035c07e09b90de7402364638b79d64ed4bc5c93e9062c80ef79f644da3679625c5b351acd413cc0eb34fd5e1321bb3150f13bf8259872afc4ef

Malware Config

Targets

    • Target

      00ee5a85ca57abcca380f08af59d2f54b805aa2161c5ee6cf3e8db9235baa8da

    • Size

      2.0MB

    • MD5

      77a86aefbdbbef43b632e33a93746683

    • SHA1

      2c1bc5e9b6edc3fd71a8b180580a045322b1e1f1

    • SHA256

      00ee5a85ca57abcca380f08af59d2f54b805aa2161c5ee6cf3e8db9235baa8da

    • SHA512

      3e154084b17f09947b9c094fdcaf7f1ef05d7b9f61e4aac295b429a9465be8b45e4c51bb92bd4b7e12ec507b2251f343b53175e1e2687105c15b2ec9f5432947

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks