General

  • Target

    e342f785ce8e13dee1a060cdaa131d3e7ad7006037e636a646bd294ac85ed77b

  • Size

    263KB

  • Sample

    220520-15aseaefd3

  • MD5

    0ae2744263d138cb299a1e247290eeb8

  • SHA1

    7aa671ab0dff4e846cbd3ba5bf8a9965490d5404

  • SHA256

    e342f785ce8e13dee1a060cdaa131d3e7ad7006037e636a646bd294ac85ed77b

  • SHA512

    c95abeda839338532340101c1488b5c555ce5d94c99c9063572668c6c39baa743b09d740adf0cf4474505f13699e98d4517917990a24d746ab4b774951f99b10

Score
7/10

Malware Config

Targets

    • Target

      e342f785ce8e13dee1a060cdaa131d3e7ad7006037e636a646bd294ac85ed77b

    • Size

      263KB

    • MD5

      0ae2744263d138cb299a1e247290eeb8

    • SHA1

      7aa671ab0dff4e846cbd3ba5bf8a9965490d5404

    • SHA256

      e342f785ce8e13dee1a060cdaa131d3e7ad7006037e636a646bd294ac85ed77b

    • SHA512

      c95abeda839338532340101c1488b5c555ce5d94c99c9063572668c6c39baa743b09d740adf0cf4474505f13699e98d4517917990a24d746ab4b774951f99b10

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks