General

  • Target

    065b92511fbf9c7a8262d4ff9ceb4abc2cf1d19c75fd80b6e5ab95ac3bfafb22

  • Size

    292KB

  • Sample

    220521-nmacpsdhb9

  • MD5

    62290a75f7c85d6d088f486715712718

  • SHA1

    8a7b88e6ad38d46b3acbb5813d2739d739ffdd63

  • SHA256

    065b92511fbf9c7a8262d4ff9ceb4abc2cf1d19c75fd80b6e5ab95ac3bfafb22

  • SHA512

    d31a19db82a198e4cba67e646d81a01a70da82a122c4addedb163279fe06eaf02456f4f861acc049f83527e23d3b366d7f819be2e10ea7e5e003b1ff794c26ec

Score
7/10

Malware Config

Targets

    • Target

      065b92511fbf9c7a8262d4ff9ceb4abc2cf1d19c75fd80b6e5ab95ac3bfafb22

    • Size

      292KB

    • MD5

      62290a75f7c85d6d088f486715712718

    • SHA1

      8a7b88e6ad38d46b3acbb5813d2739d739ffdd63

    • SHA256

      065b92511fbf9c7a8262d4ff9ceb4abc2cf1d19c75fd80b6e5ab95ac3bfafb22

    • SHA512

      d31a19db82a198e4cba67e646d81a01a70da82a122c4addedb163279fe06eaf02456f4f861acc049f83527e23d3b366d7f819be2e10ea7e5e003b1ff794c26ec

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks