General

  • Target

    d12c501323a7fe95eddb070ecd3db86c77af8ceb47b0ac87ce8bb5e9a1d524b4

  • Size

    263KB

  • Sample

    220521-bhytaaeher

  • MD5

    6c05ed29bb0726411b1d182f16533c7e

  • SHA1

    8f3f3d50d7a996d217b1749bf83294eb7b23743b

  • SHA256

    d12c501323a7fe95eddb070ecd3db86c77af8ceb47b0ac87ce8bb5e9a1d524b4

  • SHA512

    af51621ea635cb99544c23a88b9bb9bce4f081634918790b5487a10aa8f6b4a3ddf975fa105321b159ab9ee638b81e3bc0cd499a7efa805b972e32329b324d42

Malware Config

Targets

    • Target

      d12c501323a7fe95eddb070ecd3db86c77af8ceb47b0ac87ce8bb5e9a1d524b4

    • Size

      263KB

    • MD5

      6c05ed29bb0726411b1d182f16533c7e

    • SHA1

      8f3f3d50d7a996d217b1749bf83294eb7b23743b

    • SHA256

      d12c501323a7fe95eddb070ecd3db86c77af8ceb47b0ac87ce8bb5e9a1d524b4

    • SHA512

      af51621ea635cb99544c23a88b9bb9bce4f081634918790b5487a10aa8f6b4a3ddf975fa105321b159ab9ee638b81e3bc0cd499a7efa805b972e32329b324d42

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks