General

  • Target

    a756290148725e707eb5442a9750c57583700b58e0ff32598d58be0f3e9908d3

  • Size

    263KB

  • Sample

    220520-2n8tjsagcp

  • MD5

    ef8beae49e0a38d6bc7ae9c49b81b67c

  • SHA1

    7a31a268750060138fe27b8884782421ce8527ea

  • SHA256

    a756290148725e707eb5442a9750c57583700b58e0ff32598d58be0f3e9908d3

  • SHA512

    e1d521dbd334063f90e6cd036579bea9cbcb0d0ad91556abf2b7f42062896e5820d4e575ca61d3c651ecdd6e12b657e5bace492e22257dce74d9094f929d229a

Score
7/10

Malware Config

Targets

    • Target

      a756290148725e707eb5442a9750c57583700b58e0ff32598d58be0f3e9908d3

    • Size

      263KB

    • MD5

      ef8beae49e0a38d6bc7ae9c49b81b67c

    • SHA1

      7a31a268750060138fe27b8884782421ce8527ea

    • SHA256

      a756290148725e707eb5442a9750c57583700b58e0ff32598d58be0f3e9908d3

    • SHA512

      e1d521dbd334063f90e6cd036579bea9cbcb0d0ad91556abf2b7f42062896e5820d4e575ca61d3c651ecdd6e12b657e5bace492e22257dce74d9094f929d229a

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks