General

  • Target

    29b82e6a9a03273aedf2871a0df9984180d15b375a31214a65d261d3a69726fc

  • Size

    263KB

  • Sample

    220520-1923fsehh2

  • MD5

    45d1cb4fbef4334760febeeb864bf7cb

  • SHA1

    71762885c3700f9e8486365812ff3a8944f12252

  • SHA256

    29b82e6a9a03273aedf2871a0df9984180d15b375a31214a65d261d3a69726fc

  • SHA512

    603cfd2e4de7bf700cb1574bfc3032de42659a3a64f92a1945002a48a3f9bce9590a4064486ad7bb4fcb53617ad721983cf75ce3db7e7f61ec405e744a52e53e

Malware Config

Targets

    • Target

      29b82e6a9a03273aedf2871a0df9984180d15b375a31214a65d261d3a69726fc

    • Size

      263KB

    • MD5

      45d1cb4fbef4334760febeeb864bf7cb

    • SHA1

      71762885c3700f9e8486365812ff3a8944f12252

    • SHA256

      29b82e6a9a03273aedf2871a0df9984180d15b375a31214a65d261d3a69726fc

    • SHA512

      603cfd2e4de7bf700cb1574bfc3032de42659a3a64f92a1945002a48a3f9bce9590a4064486ad7bb4fcb53617ad721983cf75ce3db7e7f61ec405e744a52e53e

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks