General

  • Target

    a14c3b50628d3228124bb0f7f4f0307f1f4a991e6205b5ec8851fdc5e1d505c6

  • Size

    3.9MB

  • Sample

    220521-a1vznsbbb6

  • MD5

    88de4f4a115c61938878849afb8308a9

  • SHA1

    9315375f2a31bc938f7d90762754a2eae41f075c

  • SHA256

    a14c3b50628d3228124bb0f7f4f0307f1f4a991e6205b5ec8851fdc5e1d505c6

  • SHA512

    81faa9d6e41fa91cb54df79ff2cf53b2f0226b0094a2391445617a9e410f727558b75b59509b89ef70813d95f68c0924944b1bee2cef9a2e208db7b467a7b64e

Malware Config

Targets

    • Target

      a14c3b50628d3228124bb0f7f4f0307f1f4a991e6205b5ec8851fdc5e1d505c6

    • Size

      3.9MB

    • MD5

      88de4f4a115c61938878849afb8308a9

    • SHA1

      9315375f2a31bc938f7d90762754a2eae41f075c

    • SHA256

      a14c3b50628d3228124bb0f7f4f0307f1f4a991e6205b5ec8851fdc5e1d505c6

    • SHA512

      81faa9d6e41fa91cb54df79ff2cf53b2f0226b0094a2391445617a9e410f727558b75b59509b89ef70813d95f68c0924944b1bee2cef9a2e208db7b467a7b64e

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks