General

  • Target

    36a66e13af03492de6ca09d66c3cacc407634901a510413b9c62cc759546a737

  • Size

    3.0MB

  • Sample

    220521-at4cgadgdq

  • MD5

    f385308192c341a896af391b9514a02c

  • SHA1

    66ef37e2720b97b5f027d65812bdc6bf7d3c5a52

  • SHA256

    36a66e13af03492de6ca09d66c3cacc407634901a510413b9c62cc759546a737

  • SHA512

    693d604a284643989f093ce95d647d338f157553200ad225dbe320d2b4e9c5c04f15b637191d818c8757289648ede1be9adc77b354971757be31671d21bc0b3f

Score
7/10

Malware Config

Targets

    • Target

      36a66e13af03492de6ca09d66c3cacc407634901a510413b9c62cc759546a737

    • Size

      3.0MB

    • MD5

      f385308192c341a896af391b9514a02c

    • SHA1

      66ef37e2720b97b5f027d65812bdc6bf7d3c5a52

    • SHA256

      36a66e13af03492de6ca09d66c3cacc407634901a510413b9c62cc759546a737

    • SHA512

      693d604a284643989f093ce95d647d338f157553200ad225dbe320d2b4e9c5c04f15b637191d818c8757289648ede1be9adc77b354971757be31671d21bc0b3f

    Score
    6/10
    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks