General

  • Target

    6d360f9378b205f9764bc4db0829085dd5321db18e8c05847361fe2e9789a238

  • Size

    6.0MB

  • Sample

    220521-ampkqsdddm

  • MD5

    b8bf5c5ab48368089cc6e733c8741c71

  • SHA1

    4f86c42fa24216a26e9c6cdd0c270c6068ad1e0d

  • SHA256

    6d360f9378b205f9764bc4db0829085dd5321db18e8c05847361fe2e9789a238

  • SHA512

    054619f59ea66fe17ebf1f4653f9810b4e9240eda1dbbd4e54e946b2ba2cdadec661ef1bfe1a94cdf772e7b3c705c43b750f2983a989fd66fece5f22c7d97336

Score
7/10

Malware Config

Targets

    • Target

      6d360f9378b205f9764bc4db0829085dd5321db18e8c05847361fe2e9789a238

    • Size

      6.0MB

    • MD5

      b8bf5c5ab48368089cc6e733c8741c71

    • SHA1

      4f86c42fa24216a26e9c6cdd0c270c6068ad1e0d

    • SHA256

      6d360f9378b205f9764bc4db0829085dd5321db18e8c05847361fe2e9789a238

    • SHA512

      054619f59ea66fe17ebf1f4653f9810b4e9240eda1dbbd4e54e946b2ba2cdadec661ef1bfe1a94cdf772e7b3c705c43b750f2983a989fd66fece5f22c7d97336

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks