General

  • Target

    a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060

  • Size

    4.0MB

  • Sample

    220520-3td2sscdck

  • MD5

    dcbe8909eb8a93aa58c61f895e90231b

  • SHA1

    440d12b7c9b17561341edf632946265f56614c0b

  • SHA256

    a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060

  • SHA512

    7c033b105290cfc0d9dea966749ed7c715c12e9d516deb0f146bbae88142976123a4c2a889dd45d66e89a231a31456be9b7c6afd6642a6554a9da7f1333fc330

Score
8/10

Malware Config

Targets

    • Target

      a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060

    • Size

      4.0MB

    • MD5

      dcbe8909eb8a93aa58c61f895e90231b

    • SHA1

      440d12b7c9b17561341edf632946265f56614c0b

    • SHA256

      a9414523792bdacfacb4ab5d71b5b0a7d5ee2b30ea7cc87b64cdc6b8ac33c060

    • SHA512

      7c033b105290cfc0d9dea966749ed7c715c12e9d516deb0f146bbae88142976123a4c2a889dd45d66e89a231a31456be9b7c6afd6642a6554a9da7f1333fc330

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks