General

  • Target

    954882b540a76cd40e42b32660015ef269d02885180bf31f172207c11740c6d7

  • Size

    263KB

  • Sample

    220520-2wwh7agbc4

  • MD5

    43de00aadad6bb67ffc4e835289c0c70

  • SHA1

    b173aa567643380a3ea395c3a4538047ee2a1300

  • SHA256

    954882b540a76cd40e42b32660015ef269d02885180bf31f172207c11740c6d7

  • SHA512

    9e62b3fce427dcc3758d599f695aae4d21cbf0a667ab0851c503398fd6cef1f9b150a4795a614ed2009b61ec601f3361f636dd53463a994c5c8596b5d2c4f42d

Score
7/10

Malware Config

Targets

    • Target

      954882b540a76cd40e42b32660015ef269d02885180bf31f172207c11740c6d7

    • Size

      263KB

    • MD5

      43de00aadad6bb67ffc4e835289c0c70

    • SHA1

      b173aa567643380a3ea395c3a4538047ee2a1300

    • SHA256

      954882b540a76cd40e42b32660015ef269d02885180bf31f172207c11740c6d7

    • SHA512

      9e62b3fce427dcc3758d599f695aae4d21cbf0a667ab0851c503398fd6cef1f9b150a4795a614ed2009b61ec601f3361f636dd53463a994c5c8596b5d2c4f42d

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks