General

  • Target

    d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575

  • Size

    4.7MB

  • Sample

    220521-ealerscbbq

  • MD5

    f9d9d95aa4ae4236243997f00a013440

  • SHA1

    ab2cbbba5d20980717ccd0e30568084d8eff641c

  • SHA256

    d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575

  • SHA512

    3b890f1262f9b97683af995f0a5635c404c33e8134a3b4f292b646ffd99b8de1f3c3e48efdb2e47de1c88d1c7a0a6d5ad949c139eb6954413852236e593fbe77

Malware Config

Targets

    • Target

      d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575

    • Size

      4.7MB

    • MD5

      f9d9d95aa4ae4236243997f00a013440

    • SHA1

      ab2cbbba5d20980717ccd0e30568084d8eff641c

    • SHA256

      d2f6af1a739e94dca5d99220b5c5371bfcc0f038b465b739c8c13ee01b51d575

    • SHA512

      3b890f1262f9b97683af995f0a5635c404c33e8134a3b4f292b646ffd99b8de1f3c3e48efdb2e47de1c88d1c7a0a6d5ad949c139eb6954413852236e593fbe77

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks