General

  • Target

    f4962fe1505216dd90e14a83f9569b07560891c87be5ba19d1180e3370279a76

  • Size

    263KB

  • Sample

    220521-bhvrmabhd2

  • MD5

    8fc0814eb088f70ba5a039bbf84f751c

  • SHA1

    8b7c9ee8df09bfa87c1082420752023e85ff4918

  • SHA256

    f4962fe1505216dd90e14a83f9569b07560891c87be5ba19d1180e3370279a76

  • SHA512

    148a7853c33ec3273e59668d9c7505dcffe62688d0d0f299f0d70c8fea29c58885d5757096d9be193a7ee4815271a1debef1c07d33cfefaba2288bf15ad9198f

Score
7/10

Malware Config

Targets

    • Target

      f4962fe1505216dd90e14a83f9569b07560891c87be5ba19d1180e3370279a76

    • Size

      263KB

    • MD5

      8fc0814eb088f70ba5a039bbf84f751c

    • SHA1

      8b7c9ee8df09bfa87c1082420752023e85ff4918

    • SHA256

      f4962fe1505216dd90e14a83f9569b07560891c87be5ba19d1180e3370279a76

    • SHA512

      148a7853c33ec3273e59668d9c7505dcffe62688d0d0f299f0d70c8fea29c58885d5757096d9be193a7ee4815271a1debef1c07d33cfefaba2288bf15ad9198f

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks