General

  • Target

    44373ba48f188452be7c72d236f3db4d2a393c26eac524c3f97053ad91091a52

  • Size

    10.2MB

  • Sample

    220520-2kmf5saegk

  • MD5

    20ac6a6e59a8a44bee7399185e2a2209

  • SHA1

    3ff31a7bb7c611e648263fac20f72f05855be3c5

  • SHA256

    44373ba48f188452be7c72d236f3db4d2a393c26eac524c3f97053ad91091a52

  • SHA512

    ebdc4475264814fb67c928e31ac52f16c542b76d422a7988182813b1653e4676af5bd37834f1be19c14a9a801c7a51ce648cad761182483edf1d48150d734ddf

Malware Config

Targets

    • Target

      44373ba48f188452be7c72d236f3db4d2a393c26eac524c3f97053ad91091a52

    • Size

      10.2MB

    • MD5

      20ac6a6e59a8a44bee7399185e2a2209

    • SHA1

      3ff31a7bb7c611e648263fac20f72f05855be3c5

    • SHA256

      44373ba48f188452be7c72d236f3db4d2a393c26eac524c3f97053ad91091a52

    • SHA512

      ebdc4475264814fb67c928e31ac52f16c542b76d422a7988182813b1653e4676af5bd37834f1be19c14a9a801c7a51ce648cad761182483edf1d48150d734ddf

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks