General

  • Target

    1a67c138490437ab87a221970a4697e0659e55c74322d8332530f3c42ef08c8a

  • Size

    971KB

  • Sample

    220521-eavcnscbcm

  • MD5

    72b6b745992af885b5c19714ef7a93b2

  • SHA1

    632f1889aabbbb9d10a8c2721b4455964a162a69

  • SHA256

    1a67c138490437ab87a221970a4697e0659e55c74322d8332530f3c42ef08c8a

  • SHA512

    58128203da14d196276662ce82e71e92567faa5a07827cd8b219de442fde4e6fe0b0bea87a97476e3989d897cdd926722c6557e003be43db49f0246dd59831df

Score
7/10

Malware Config

Targets

    • Target

      1a67c138490437ab87a221970a4697e0659e55c74322d8332530f3c42ef08c8a

    • Size

      971KB

    • MD5

      72b6b745992af885b5c19714ef7a93b2

    • SHA1

      632f1889aabbbb9d10a8c2721b4455964a162a69

    • SHA256

      1a67c138490437ab87a221970a4697e0659e55c74322d8332530f3c42ef08c8a

    • SHA512

      58128203da14d196276662ce82e71e92567faa5a07827cd8b219de442fde4e6fe0b0bea87a97476e3989d897cdd926722c6557e003be43db49f0246dd59831df

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks