General

  • Target

    d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde

  • Size

    263KB

  • Sample

    220521-bhxk8aehen

  • MD5

    b0045215045d3c6c88022336eed83a41

  • SHA1

    ecf1c58d4e8dd900464e2c50fa97347a7a0a5192

  • SHA256

    d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde

  • SHA512

    dd82d2cffa191e01822d168610c317687d69f702a3add03d296b8d90dfbe2d347407ca28183cdd1b0a42c8ea1d21397d351da451a8b4169a4c22a3ba945fadd7

Malware Config

Targets

    • Target

      d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde

    • Size

      263KB

    • MD5

      b0045215045d3c6c88022336eed83a41

    • SHA1

      ecf1c58d4e8dd900464e2c50fa97347a7a0a5192

    • SHA256

      d2fa483acdc0477c7e5646c6c236874bb7a10bc5b172bff1d02b6e0b77ce9fde

    • SHA512

      dd82d2cffa191e01822d168610c317687d69f702a3add03d296b8d90dfbe2d347407ca28183cdd1b0a42c8ea1d21397d351da451a8b4169a4c22a3ba945fadd7

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks