General

  • Target

    45f21aefa2ff622d9b48cccf2f1f9d472ad705291efe7424845845196fac7d5b

  • Size

    10.3MB

  • Sample

    220521-a2rcwaebfl

  • MD5

    6b208c9c1b6ad1144ff095eb378bc281

  • SHA1

    6d4b5edf0e6c1d497a9dd8e463bac2cfe35323aa

  • SHA256

    45f21aefa2ff622d9b48cccf2f1f9d472ad705291efe7424845845196fac7d5b

  • SHA512

    0ecb173f6df45d64cd5fe49b70fe98b468739d28f3a72a75c28e610c843423c23ac1e8f994baa1bd3baa7d028401d70479a21b9806e985f427ba67e5cfcdef8d

Score
8/10

Malware Config

Targets

    • Target

      45f21aefa2ff622d9b48cccf2f1f9d472ad705291efe7424845845196fac7d5b

    • Size

      10.3MB

    • MD5

      6b208c9c1b6ad1144ff095eb378bc281

    • SHA1

      6d4b5edf0e6c1d497a9dd8e463bac2cfe35323aa

    • SHA256

      45f21aefa2ff622d9b48cccf2f1f9d472ad705291efe7424845845196fac7d5b

    • SHA512

      0ecb173f6df45d64cd5fe49b70fe98b468739d28f3a72a75c28e610c843423c23ac1e8f994baa1bd3baa7d028401d70479a21b9806e985f427ba67e5cfcdef8d

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks