General

  • Target

    e7aa541d5b0177cc63fc78cc3de2970056fd92d922debe9d0db4b26e55391248

  • Size

    271KB

  • Sample

    220521-bhwzpabhd4

  • MD5

    fe4fa587ee5beb22b858afebca0180e8

  • SHA1

    b3b70dd314f34ae7f819282e8b5c4a31fb8be017

  • SHA256

    e7aa541d5b0177cc63fc78cc3de2970056fd92d922debe9d0db4b26e55391248

  • SHA512

    fb203d528d32729b69a4f2987a6959f37522425036edb296924c9db14c2de2cda8f263ae5892b4db67dfe5223037abf52af3ea3e8ec4cb0d0d0fb1890b07a1c6

Malware Config

Targets

    • Target

      e7aa541d5b0177cc63fc78cc3de2970056fd92d922debe9d0db4b26e55391248

    • Size

      271KB

    • MD5

      fe4fa587ee5beb22b858afebca0180e8

    • SHA1

      b3b70dd314f34ae7f819282e8b5c4a31fb8be017

    • SHA256

      e7aa541d5b0177cc63fc78cc3de2970056fd92d922debe9d0db4b26e55391248

    • SHA512

      fb203d528d32729b69a4f2987a6959f37522425036edb296924c9db14c2de2cda8f263ae5892b4db67dfe5223037abf52af3ea3e8ec4cb0d0d0fb1890b07a1c6

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks