General

  • Target

    6c31f2da1b25ff0ca8e3a91d10504cdcdfe01882fc2d7b5d1775cf726d4002f1

  • Size

    304KB

  • Sample

    220521-nl6drahacl

  • MD5

    fc085a75e83e7fea14e64000b7856708

  • SHA1

    236a5f1e6f02e047551fd107335625db6544552f

  • SHA256

    6c31f2da1b25ff0ca8e3a91d10504cdcdfe01882fc2d7b5d1775cf726d4002f1

  • SHA512

    722d9027e971da6736e11dfc6b930da30f16eb2562b4de5e5932f26fde38797a5d7d8e0c3411b510f40f6f8ff81df45e61fffa0fa62011a2173ea3e7c7a0a166

Score
7/10

Malware Config

Targets

    • Target

      6c31f2da1b25ff0ca8e3a91d10504cdcdfe01882fc2d7b5d1775cf726d4002f1

    • Size

      304KB

    • MD5

      fc085a75e83e7fea14e64000b7856708

    • SHA1

      236a5f1e6f02e047551fd107335625db6544552f

    • SHA256

      6c31f2da1b25ff0ca8e3a91d10504cdcdfe01882fc2d7b5d1775cf726d4002f1

    • SHA512

      722d9027e971da6736e11dfc6b930da30f16eb2562b4de5e5932f26fde38797a5d7d8e0c3411b510f40f6f8ff81df45e61fffa0fa62011a2173ea3e7c7a0a166

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks