General

  • Target

    6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf

  • Size

    263KB

  • Sample

    220520-1gmr3ahagr

  • MD5

    3f40cb131f3e98c7f0f60854738046f9

  • SHA1

    f885004d7ecd035f9c35dbd2f0599039f9e34e53

  • SHA256

    6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf

  • SHA512

    7819ccaca7fe852b5c3116b45b7a76230c561814a8b4270d037285be2fa4ec2e90807415eb4093deda4d826869e5dafe4b73b8266d2554d43432795f0b8ae4ae

Malware Config

Targets

    • Target

      6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf

    • Size

      263KB

    • MD5

      3f40cb131f3e98c7f0f60854738046f9

    • SHA1

      f885004d7ecd035f9c35dbd2f0599039f9e34e53

    • SHA256

      6d38d00e3a52abd408d338c6a4929faaea36d789681bc6ba8b02227e8297ecaf

    • SHA512

      7819ccaca7fe852b5c3116b45b7a76230c561814a8b4270d037285be2fa4ec2e90807415eb4093deda4d826869e5dafe4b73b8266d2554d43432795f0b8ae4ae

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks