General

  • Target

    com.ctgsms.mesglass.apk

  • Size

    6.2MB

  • Sample

    220320-h13zaaaec6

  • MD5

    34c24c0cf73289b1d5298960e1d75501

  • SHA1

    6bdcd892e4c8080cbb02beb7ab3dd927cf84f4a4

  • SHA256

    b3d4bbba8aa5451f23f636367db4d16e00c5cc5416770fd5bde80a7fc61fe96e

  • SHA512

    44a5c9bf3dd7e5bc79676ed7291c76fa196296e2b1f880150495bd0289abff75b2c9953975a3b431e34a67c849c63890188b2d3e1a88331902c88890e62d1de3

Score
7/10

Malware Config

Targets

    • Target

      com.ctgsms.mesglass.apk

    • Size

      6.2MB

    • MD5

      34c24c0cf73289b1d5298960e1d75501

    • SHA1

      6bdcd892e4c8080cbb02beb7ab3dd927cf84f4a4

    • SHA256

      b3d4bbba8aa5451f23f636367db4d16e00c5cc5416770fd5bde80a7fc61fe96e

    • SHA512

      44a5c9bf3dd7e5bc79676ed7291c76fa196296e2b1f880150495bd0289abff75b2c9953975a3b431e34a67c849c63890188b2d3e1a88331902c88890e62d1de3

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks