General

  • Target

    6efba672aed4b91837758ee91b5c7bdc632cabd64df923fc702b5de24159bf19.apk

  • Size

    6.3MB

  • Sample

    211019-t4tqkahbam

  • MD5

    f990e3040e13821787b24d8b70211171

  • SHA1

    42420b60bde4b052be9658e1c82451592ee15da8

  • SHA256

    6efba672aed4b91837758ee91b5c7bdc632cabd64df923fc702b5de24159bf19

  • SHA512

    e52c4977f7bbe3cc858398cbe44c54aa654702aaa61a348df95b044a3797c753cb535bc64cb9c5183e48bccc48e5c61c7ad5b15f38fe638bb2509e89c540cc9f

Score
7/10

Malware Config

Targets

    • Target

      6efba672aed4b91837758ee91b5c7bdc632cabd64df923fc702b5de24159bf19.apk

    • Size

      6.3MB

    • MD5

      f990e3040e13821787b24d8b70211171

    • SHA1

      42420b60bde4b052be9658e1c82451592ee15da8

    • SHA256

      6efba672aed4b91837758ee91b5c7bdc632cabd64df923fc702b5de24159bf19

    • SHA512

      e52c4977f7bbe3cc858398cbe44c54aa654702aaa61a348df95b044a3797c753cb535bc64cb9c5183e48bccc48e5c61c7ad5b15f38fe638bb2509e89c540cc9f

    Score
    6/10
    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks