General

  • Target

    3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2

  • Size

    6.0MB

  • Sample

    220520-2t9b9sbadl

  • MD5

    9d7612e9082ec805fd0ee7752076ac25

  • SHA1

    e96dff37974da7e594336819f577cefeaa38aeae

  • SHA256

    3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2

  • SHA512

    bac2ad351c1fa586f6045020f47a5cba640f723b9b22009c1f4b6ab900984e710ab015fcbb31c3040e5ef95f1e9d7c87da87913744662ecdfece52fb63cc43cd

Malware Config

Targets

    • Target

      3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2

    • Size

      6.0MB

    • MD5

      9d7612e9082ec805fd0ee7752076ac25

    • SHA1

      e96dff37974da7e594336819f577cefeaa38aeae

    • SHA256

      3ee1fbc542bf826def550b5ab72b280c4b7007071945b167cccf3999009146d2

    • SHA512

      bac2ad351c1fa586f6045020f47a5cba640f723b9b22009c1f4b6ab900984e710ab015fcbb31c3040e5ef95f1e9d7c87da87913744662ecdfece52fb63cc43cd

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks