General

  • Target

    30ae2d71a91a6063e96639c2701844ac59be95254d798dc4ded82415d1d8c12d

  • Size

    15.7MB

  • Sample

    220520-2jh3bsfde9

  • MD5

    9bc2429b1902847447527454f433c397

  • SHA1

    4133ff7b7055da95020953d6426261302abb5de2

  • SHA256

    30ae2d71a91a6063e96639c2701844ac59be95254d798dc4ded82415d1d8c12d

  • SHA512

    eb3cb2ebd9a26450caf02929d981e9535ec0a378c96ea4d3759c79a2088077546b8e3dcd5345251b77e846f878a3e274c083f794e6f86bb17194602213c92c11

Malware Config

Targets

    • Target

      30ae2d71a91a6063e96639c2701844ac59be95254d798dc4ded82415d1d8c12d

    • Size

      15.7MB

    • MD5

      9bc2429b1902847447527454f433c397

    • SHA1

      4133ff7b7055da95020953d6426261302abb5de2

    • SHA256

      30ae2d71a91a6063e96639c2701844ac59be95254d798dc4ded82415d1d8c12d

    • SHA512

      eb3cb2ebd9a26450caf02929d981e9535ec0a378c96ea4d3759c79a2088077546b8e3dcd5345251b77e846f878a3e274c083f794e6f86bb17194602213c92c11

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks