General

  • Target

    c39bfff240c601301bbe829565d0800367d0ace885b3dd57a8dce0939dc56925

  • Size

    1.4MB

  • Sample

    220521-azew3abaf5

  • MD5

    7533f5ca89aa82464b9d997e9fe8e1e5

  • SHA1

    413c5868ef3b92c6fa44423404c1ea6b9d4d110f

  • SHA256

    c39bfff240c601301bbe829565d0800367d0ace885b3dd57a8dce0939dc56925

  • SHA512

    5ac86bdce43d7de3e18e6e4e68097a9217ed20e520bf4a9670026297544a1055f642829b1a05b1b48498e58919f524fd3d108cea0fd0cd2ed3e7ab6eaccf6ec9

Malware Config

Targets

    • Target

      c39bfff240c601301bbe829565d0800367d0ace885b3dd57a8dce0939dc56925

    • Size

      1.4MB

    • MD5

      7533f5ca89aa82464b9d997e9fe8e1e5

    • SHA1

      413c5868ef3b92c6fa44423404c1ea6b9d4d110f

    • SHA256

      c39bfff240c601301bbe829565d0800367d0ace885b3dd57a8dce0939dc56925

    • SHA512

      5ac86bdce43d7de3e18e6e4e68097a9217ed20e520bf4a9670026297544a1055f642829b1a05b1b48498e58919f524fd3d108cea0fd0cd2ed3e7ab6eaccf6ec9

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks