General

  • Target

    d12e7e7240f1b3dbef758676a572e84aebbebd442d422fe2540b8c8b8321e7ad

  • Size

    263KB

  • Sample

    220521-bhx7raehep

  • MD5

    2ea9c1e194dc97b9d8efb4f42a92cf1d

  • SHA1

    3fe7e11732b3388b4fbd5768f0789f9ae61ec606

  • SHA256

    d12e7e7240f1b3dbef758676a572e84aebbebd442d422fe2540b8c8b8321e7ad

  • SHA512

    d6bcea1d6a550ef434e4965bac6649da03e54e158a1ac370f544fe990edffd9c7eaf82516f75e3ee0970cf8d2daaf25dead2a37ba4e771dd6c06ca7b573187b2

Malware Config

Targets

    • Target

      d12e7e7240f1b3dbef758676a572e84aebbebd442d422fe2540b8c8b8321e7ad

    • Size

      263KB

    • MD5

      2ea9c1e194dc97b9d8efb4f42a92cf1d

    • SHA1

      3fe7e11732b3388b4fbd5768f0789f9ae61ec606

    • SHA256

      d12e7e7240f1b3dbef758676a572e84aebbebd442d422fe2540b8c8b8321e7ad

    • SHA512

      d6bcea1d6a550ef434e4965bac6649da03e54e158a1ac370f544fe990edffd9c7eaf82516f75e3ee0970cf8d2daaf25dead2a37ba4e771dd6c06ca7b573187b2

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks