General

  • Target

    47fb414f39bbc8e9d7f72eeff526026c13297b05bea543c6ec17b65ca7a2a706

  • Size

    5.1MB

  • Sample

    220521-earxjscbck

  • MD5

    39348e09c344bd29945b0d46efe5633a

  • SHA1

    d253c78c7c7985dd508bfe897ca098760128aadf

  • SHA256

    47fb414f39bbc8e9d7f72eeff526026c13297b05bea543c6ec17b65ca7a2a706

  • SHA512

    7298dc43e0a90fcd58a41e6724c120d87b737b4baa921f837d923abc0baa14c10937845ddef767ff1cdd9f6e0acbf3684a722f5e5126162124f1d2e3482dffda

Score
7/10

Malware Config

Targets

    • Target

      47fb414f39bbc8e9d7f72eeff526026c13297b05bea543c6ec17b65ca7a2a706

    • Size

      5.1MB

    • MD5

      39348e09c344bd29945b0d46efe5633a

    • SHA1

      d253c78c7c7985dd508bfe897ca098760128aadf

    • SHA256

      47fb414f39bbc8e9d7f72eeff526026c13297b05bea543c6ec17b65ca7a2a706

    • SHA512

      7298dc43e0a90fcd58a41e6724c120d87b737b4baa921f837d923abc0baa14c10937845ddef767ff1cdd9f6e0acbf3684a722f5e5126162124f1d2e3482dffda

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks