General

  • Target

    22816a3acaddd9080e51aeb36cb9211495762af7243dc33a0e14d17eda8b91c7

  • Size

    9.9MB

  • Sample

    220520-3nc8bacbbk

  • MD5

    5dd0606c2681af9254a82df9d8438f06

  • SHA1

    bc983ed6e076e161aa7aebfede521f05d0ec93c1

  • SHA256

    22816a3acaddd9080e51aeb36cb9211495762af7243dc33a0e14d17eda8b91c7

  • SHA512

    feffcf68596d7c9207df596610002f640ee56b837c825ee8c87ef86a0967eb02a42a95ec3e4f39deb93037fb8227283e832ced60602bd5ae48f831b07502f976

Score
7/10

Malware Config

Targets

    • Target

      22816a3acaddd9080e51aeb36cb9211495762af7243dc33a0e14d17eda8b91c7

    • Size

      9.9MB

    • MD5

      5dd0606c2681af9254a82df9d8438f06

    • SHA1

      bc983ed6e076e161aa7aebfede521f05d0ec93c1

    • SHA256

      22816a3acaddd9080e51aeb36cb9211495762af7243dc33a0e14d17eda8b91c7

    • SHA512

      feffcf68596d7c9207df596610002f640ee56b837c825ee8c87ef86a0967eb02a42a95ec3e4f39deb93037fb8227283e832ced60602bd5ae48f831b07502f976

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks