General

  • Target

    8891c10f09b0bc7ecf71f5d75507d5339c28da8810552b278d4771c69834619c

  • Size

    276KB

  • Sample

    220521-nl5gfsdhb6

  • MD5

    8c095fdca5d9083eea85b3b5e758ae36

  • SHA1

    0c1cbe0ca1a018fc3d293039e1b5a675fde14b92

  • SHA256

    8891c10f09b0bc7ecf71f5d75507d5339c28da8810552b278d4771c69834619c

  • SHA512

    aae7a33b8ea654a6fb3ca4e8eaa16295f59ccb3cb9a555c9c1ed897692dafbf7d679f31a5f57867c062365acc388540d8f2bac7a1d682824ca9c527f0f132e48

Score
7/10

Malware Config

Targets

    • Target

      8891c10f09b0bc7ecf71f5d75507d5339c28da8810552b278d4771c69834619c

    • Size

      276KB

    • MD5

      8c095fdca5d9083eea85b3b5e758ae36

    • SHA1

      0c1cbe0ca1a018fc3d293039e1b5a675fde14b92

    • SHA256

      8891c10f09b0bc7ecf71f5d75507d5339c28da8810552b278d4771c69834619c

    • SHA512

      aae7a33b8ea654a6fb3ca4e8eaa16295f59ccb3cb9a555c9c1ed897692dafbf7d679f31a5f57867c062365acc388540d8f2bac7a1d682824ca9c527f0f132e48

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks