General

  • Target

    3b0f6d36a78148cdb7fb97d9d75f70b34fe21b0c42321ed7aeb6c8af247d49db

  • Size

    276KB

  • Sample

    220521-nmvcwahaer

  • MD5

    32d35ba4b1c181c6e620f088062e8c73

  • SHA1

    a1ca223290ec9883473e5aa2ec404edf1511f665

  • SHA256

    3b0f6d36a78148cdb7fb97d9d75f70b34fe21b0c42321ed7aeb6c8af247d49db

  • SHA512

    df5c5970b0ccb618f7f2f56a40ef10401457b123607e330b1cf8133dc2cd05700f873cc3b4e278695440c0be45d3360ab7044a30f86d2da357595685ea2a0f21

Score
7/10

Malware Config

Targets

    • Target

      3b0f6d36a78148cdb7fb97d9d75f70b34fe21b0c42321ed7aeb6c8af247d49db

    • Size

      276KB

    • MD5

      32d35ba4b1c181c6e620f088062e8c73

    • SHA1

      a1ca223290ec9883473e5aa2ec404edf1511f665

    • SHA256

      3b0f6d36a78148cdb7fb97d9d75f70b34fe21b0c42321ed7aeb6c8af247d49db

    • SHA512

      df5c5970b0ccb618f7f2f56a40ef10401457b123607e330b1cf8133dc2cd05700f873cc3b4e278695440c0be45d3360ab7044a30f86d2da357595685ea2a0f21

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks