General

  • Target

    a951a8491f5230fcfd303c27eaec312c4b75a5afaa414c9313e5c1277d61b3fb

  • Size

    274KB

  • Sample

    220521-nl4vxshacj

  • MD5

    9ff7d2841decf9ebe14ea1708beca329

  • SHA1

    4f14bcaf5502d8d24eb1f20d2b57c6c4867010e2

  • SHA256

    a951a8491f5230fcfd303c27eaec312c4b75a5afaa414c9313e5c1277d61b3fb

  • SHA512

    8ec83e7ad081cf349fff5033bf8f396a6f61d4ba26411a0adab5635af00dd2c7d539e7ac601d1e58e0223986d891cef753601d02c0132e037c569217ee34684c

Score
7/10

Malware Config

Targets

    • Target

      a951a8491f5230fcfd303c27eaec312c4b75a5afaa414c9313e5c1277d61b3fb

    • Size

      274KB

    • MD5

      9ff7d2841decf9ebe14ea1708beca329

    • SHA1

      4f14bcaf5502d8d24eb1f20d2b57c6c4867010e2

    • SHA256

      a951a8491f5230fcfd303c27eaec312c4b75a5afaa414c9313e5c1277d61b3fb

    • SHA512

      8ec83e7ad081cf349fff5033bf8f396a6f61d4ba26411a0adab5635af00dd2c7d539e7ac601d1e58e0223986d891cef753601d02c0132e037c569217ee34684c

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks