General

  • Target

    ce7aaa26cc8fd45b7347223df77402e7eef55d3298b52dd04c7d31969b0b2dff

  • Size

    263KB

  • Sample

    220521-nmsjaadhc7

  • MD5

    1e093958f6dd2cc68735bc2f803d2521

  • SHA1

    053a98623aad269901fec1bd6f2bd70c2aeece4c

  • SHA256

    ce7aaa26cc8fd45b7347223df77402e7eef55d3298b52dd04c7d31969b0b2dff

  • SHA512

    d02176ff171ce7a49656ebedaa5231a379e92cc9206e1a053435659755d5d8d0759317f13a09090b602548fcf34addab8815afd3e444cb31bd0cc6d22191eae1

Malware Config

Targets

    • Target

      ce7aaa26cc8fd45b7347223df77402e7eef55d3298b52dd04c7d31969b0b2dff

    • Size

      263KB

    • MD5

      1e093958f6dd2cc68735bc2f803d2521

    • SHA1

      053a98623aad269901fec1bd6f2bd70c2aeece4c

    • SHA256

      ce7aaa26cc8fd45b7347223df77402e7eef55d3298b52dd04c7d31969b0b2dff

    • SHA512

      d02176ff171ce7a49656ebedaa5231a379e92cc9206e1a053435659755d5d8d0759317f13a09090b602548fcf34addab8815afd3e444cb31bd0cc6d22191eae1

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks