General

  • Target

    1041a5f3e8a7c8bfeedc6c69ab030d242a30603184e137c32e9f70ba318d61db

  • Size

    18.1MB

  • Sample

    220520-3pw2tahcf3

  • MD5

    186ef5d09ad8d52b781e2f5ec5ea91b3

  • SHA1

    d47cc66334bb3196349c0ff54eb175dd239fe5e4

  • SHA256

    1041a5f3e8a7c8bfeedc6c69ab030d242a30603184e137c32e9f70ba318d61db

  • SHA512

    e3d4b33739f9a3e239d1a9453577479f0ce6a313446140966c02bfaa760f50b509a7b09b68830c9df29f38b9e8647d26d2cff533dae9bb87d43530edf89ffb37

Score
7/10

Malware Config

Targets

    • Target

      1041a5f3e8a7c8bfeedc6c69ab030d242a30603184e137c32e9f70ba318d61db

    • Size

      18.1MB

    • MD5

      186ef5d09ad8d52b781e2f5ec5ea91b3

    • SHA1

      d47cc66334bb3196349c0ff54eb175dd239fe5e4

    • SHA256

      1041a5f3e8a7c8bfeedc6c69ab030d242a30603184e137c32e9f70ba318d61db

    • SHA512

      e3d4b33739f9a3e239d1a9453577479f0ce6a313446140966c02bfaa760f50b509a7b09b68830c9df29f38b9e8647d26d2cff533dae9bb87d43530edf89ffb37

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks