General

  • Target

    8ea55a1faa2f8e7ed27e6d2d381e3a6273bc234a1a532811d57be87430c3c930

  • Size

    308KB

  • Sample

    220521-emkzrsceer

  • MD5

    2ce7a003694fe55b4114711cce007a73

  • SHA1

    e944c9e9a5903128900bf83e0511fcc19e537d30

  • SHA256

    8ea55a1faa2f8e7ed27e6d2d381e3a6273bc234a1a532811d57be87430c3c930

  • SHA512

    d95c63be05497881648701b2e60266c9b4c70e8ae85396a8aedf3dda2acbbb87e8e46a188e132a45bbb797f897c2fc2de2d76d97b0b13873e628174e98df284e

Score
7/10

Malware Config

Targets

    • Target

      8ea55a1faa2f8e7ed27e6d2d381e3a6273bc234a1a532811d57be87430c3c930

    • Size

      308KB

    • MD5

      2ce7a003694fe55b4114711cce007a73

    • SHA1

      e944c9e9a5903128900bf83e0511fcc19e537d30

    • SHA256

      8ea55a1faa2f8e7ed27e6d2d381e3a6273bc234a1a532811d57be87430c3c930

    • SHA512

      d95c63be05497881648701b2e60266c9b4c70e8ae85396a8aedf3dda2acbbb87e8e46a188e132a45bbb797f897c2fc2de2d76d97b0b13873e628174e98df284e

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks