General

  • Target

    038112fc434477dfea21607360a9461b3fd3d4818157289605ffc5b3cf142adf

  • Size

    263KB

  • Sample

    220521-nm1jwsdhd8

  • MD5

    94158d86d7cc79458ac3d933c0b64fac

  • SHA1

    d02f862e54daf6b3d945eb484a9f7b3dab15e1cc

  • SHA256

    038112fc434477dfea21607360a9461b3fd3d4818157289605ffc5b3cf142adf

  • SHA512

    b3a9dd1a3e14db62765b59bc5975cbc6656b4be2b2babb1f74475df5d0c3a570ab686c7564f7241dd742c8f468d2361379c3db155371d3cbb830e41a0081a27a

Malware Config

Targets

    • Target

      038112fc434477dfea21607360a9461b3fd3d4818157289605ffc5b3cf142adf

    • Size

      263KB

    • MD5

      94158d86d7cc79458ac3d933c0b64fac

    • SHA1

      d02f862e54daf6b3d945eb484a9f7b3dab15e1cc

    • SHA256

      038112fc434477dfea21607360a9461b3fd3d4818157289605ffc5b3cf142adf

    • SHA512

      b3a9dd1a3e14db62765b59bc5975cbc6656b4be2b2babb1f74475df5d0c3a570ab686c7564f7241dd742c8f468d2361379c3db155371d3cbb830e41a0081a27a

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks