General

  • Target

    407ef8509e6a1f97fac0cfaa1a7ecb3887d1d4d03052dd9e6febcf34e1688736

  • Size

    263KB

  • Sample

    220521-nms5tadhc8

  • MD5

    94f6a9bbcefca1c846fc3bce84635b41

  • SHA1

    12f5e8dcc9bd7492681a3cf0c23cfa98a92bd45f

  • SHA256

    407ef8509e6a1f97fac0cfaa1a7ecb3887d1d4d03052dd9e6febcf34e1688736

  • SHA512

    ff5170e0aa9cc3fbc8215b702d13c755a25e742d80f4f3c6ec8050192164e5dce14e63e7770f83494cded1de8f97d4c32ea5f9ff7bcb2e6e46759d984729be7c

Malware Config

Targets

    • Target

      407ef8509e6a1f97fac0cfaa1a7ecb3887d1d4d03052dd9e6febcf34e1688736

    • Size

      263KB

    • MD5

      94f6a9bbcefca1c846fc3bce84635b41

    • SHA1

      12f5e8dcc9bd7492681a3cf0c23cfa98a92bd45f

    • SHA256

      407ef8509e6a1f97fac0cfaa1a7ecb3887d1d4d03052dd9e6febcf34e1688736

    • SHA512

      ff5170e0aa9cc3fbc8215b702d13c755a25e742d80f4f3c6ec8050192164e5dce14e63e7770f83494cded1de8f97d4c32ea5f9ff7bcb2e6e46759d984729be7c

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks