General

  • Target

    0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2

  • Size

    263KB

  • Sample

    220521-nmx4rshafl

  • MD5

    0105c9fc3fca54eff57d0aa586fd7e72

  • SHA1

    270d47af315ad248062c91acf05172fbe5d0f223

  • SHA256

    0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2

  • SHA512

    090b46ffc29b3f49e413e68fa368c680f19cf613b8250dcb52734208081ac9d9381e7f15f808e22e89a4db348bf595d712855674b646b9949a6ba6d19ea31e7c

Malware Config

Targets

    • Target

      0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2

    • Size

      263KB

    • MD5

      0105c9fc3fca54eff57d0aa586fd7e72

    • SHA1

      270d47af315ad248062c91acf05172fbe5d0f223

    • SHA256

      0bb0edfbe0a7a0611f90bf2d4562c79a65b78e07b8edaacedad70a18ebfaddb2

    • SHA512

      090b46ffc29b3f49e413e68fa368c680f19cf613b8250dcb52734208081ac9d9381e7f15f808e22e89a4db348bf595d712855674b646b9949a6ba6d19ea31e7c

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks