General

  • Target

    31dda31e3b3c1b526c55a354910129db5e8835082ce3c2e4fde92484843ce74c

  • Size

    5.5MB

  • Sample

    220521-mhk3zabge3

  • MD5

    f3be2d24e26ee283122bbe59579962a8

  • SHA1

    040318870cc542189eb50bef3158b2be3d459d01

  • SHA256

    31dda31e3b3c1b526c55a354910129db5e8835082ce3c2e4fde92484843ce74c

  • SHA512

    60dc88da4f73928d2355980690676bf8c947dacae15b3582bfa2affd37490eeb66e6e5e572f36893c08f8e6c8f94d3f38e47cf12ae4eea9f73da55983dd25a86

Malware Config

Targets

    • Target

      31dda31e3b3c1b526c55a354910129db5e8835082ce3c2e4fde92484843ce74c

    • Size

      5.5MB

    • MD5

      f3be2d24e26ee283122bbe59579962a8

    • SHA1

      040318870cc542189eb50bef3158b2be3d459d01

    • SHA256

      31dda31e3b3c1b526c55a354910129db5e8835082ce3c2e4fde92484843ce74c

    • SHA512

      60dc88da4f73928d2355980690676bf8c947dacae15b3582bfa2affd37490eeb66e6e5e572f36893c08f8e6c8f94d3f38e47cf12ae4eea9f73da55983dd25a86

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks