General

  • Target

    f05e9868d0e0da036f24a3d9b6e4eac9c676319fa4d2726a6921654efb6852df

  • Size

    5.1MB

  • Sample

    220520-128j9shgbk

  • MD5

    dfc129f096e0c4059b3a96189684fa44

  • SHA1

    113a7df10fb87a6e2b2155e5efb66f90cf382ffb

  • SHA256

    f05e9868d0e0da036f24a3d9b6e4eac9c676319fa4d2726a6921654efb6852df

  • SHA512

    45695a4d61e253e12990c0e4b91651b033c46f51877791927f7bf703f55788173cd576c8dcd74150c56405997ce255f186aaa993ac05e86f64f112c84db82377

Score
7/10

Malware Config

Targets

    • Target

      f05e9868d0e0da036f24a3d9b6e4eac9c676319fa4d2726a6921654efb6852df

    • Size

      5.1MB

    • MD5

      dfc129f096e0c4059b3a96189684fa44

    • SHA1

      113a7df10fb87a6e2b2155e5efb66f90cf382ffb

    • SHA256

      f05e9868d0e0da036f24a3d9b6e4eac9c676319fa4d2726a6921654efb6852df

    • SHA512

      45695a4d61e253e12990c0e4b91651b033c46f51877791927f7bf703f55788173cd576c8dcd74150c56405997ce255f186aaa993ac05e86f64f112c84db82377

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks