General

  • Target

    a5ab3c0eac6ba2a764bafe24e4e6d4cc262b26b22ab0e3b52b24786cd5cecbaf

  • Size

    271KB

  • Sample

    220520-2wj56agbb3

  • MD5

    ca03ff5d0ac8cbfd8a0d4faa8e318adb

  • SHA1

    82310aebfaac5a515c7b603144cc05dcc21579f1

  • SHA256

    a5ab3c0eac6ba2a764bafe24e4e6d4cc262b26b22ab0e3b52b24786cd5cecbaf

  • SHA512

    c3a226cf3031fc9a645c185ed93b381cfc8e0dd1328f376615bb6c628157e6bfb55f22cb3b4799876f2da2e9f3ca2e485fcdd4723adbcfd7ca6babcd2a5f780b

Malware Config

Targets

    • Target

      a5ab3c0eac6ba2a764bafe24e4e6d4cc262b26b22ab0e3b52b24786cd5cecbaf

    • Size

      271KB

    • MD5

      ca03ff5d0ac8cbfd8a0d4faa8e318adb

    • SHA1

      82310aebfaac5a515c7b603144cc05dcc21579f1

    • SHA256

      a5ab3c0eac6ba2a764bafe24e4e6d4cc262b26b22ab0e3b52b24786cd5cecbaf

    • SHA512

      c3a226cf3031fc9a645c185ed93b381cfc8e0dd1328f376615bb6c628157e6bfb55f22cb3b4799876f2da2e9f3ca2e485fcdd4723adbcfd7ca6babcd2a5f780b

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks