General

  • Target

    547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8

  • Size

    5.4MB

  • Sample

    220520-2caglsfag4

  • MD5

    4d19c031247c652cb6492499c8b62a07

  • SHA1

    df96e0ee65372d93a39aec352eeb1a7c63e354fb

  • SHA256

    547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8

  • SHA512

    e394cfb2bbd0bee851d813cf2f1bb8c714f482d3078dd2bcbf8f18ef078927d4121d0f1050d8935d8672d82f98ea3912eb3f64f1f1b29d9a51ba04fb3a14cd52

Score
7/10

Malware Config

Targets

    • Target

      547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8

    • Size

      5.4MB

    • MD5

      4d19c031247c652cb6492499c8b62a07

    • SHA1

      df96e0ee65372d93a39aec352eeb1a7c63e354fb

    • SHA256

      547cbc32a68058f761e75c20f69574c169d99bcdbec09641e88370a3923e9bc8

    • SHA512

      e394cfb2bbd0bee851d813cf2f1bb8c714f482d3078dd2bcbf8f18ef078927d4121d0f1050d8935d8672d82f98ea3912eb3f64f1f1b29d9a51ba04fb3a14cd52

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks