General

  • Target

    66096ffbeab196c7221adda9696f02c41a194792a7773d9f3b7043f20c84faa4

  • Size

    5MB

  • Sample

    220521-p28z9agea7

  • MD5

    04964c79de48c05ca011f2caa9ef7799

  • SHA1

    b2daa1e20e90b1d811679ed0373113c9c7357467

  • SHA256

    66096ffbeab196c7221adda9696f02c41a194792a7773d9f3b7043f20c84faa4

  • SHA512

    1888feef880470ba168ec84e157a68d7f2b2d4ae3b2fd80ca914558ff41c47e48da03caf69cd00a9369a1ed0f3565fb55bd9e6b197f4659763ed2407bfa20ae5

Score
7/10

Malware Config

Targets

    • Target

      66096ffbeab196c7221adda9696f02c41a194792a7773d9f3b7043f20c84faa4

    • Size

      5MB

    • MD5

      04964c79de48c05ca011f2caa9ef7799

    • SHA1

      b2daa1e20e90b1d811679ed0373113c9c7357467

    • SHA256

      66096ffbeab196c7221adda9696f02c41a194792a7773d9f3b7043f20c84faa4

    • SHA512

      1888feef880470ba168ec84e157a68d7f2b2d4ae3b2fd80ca914558ff41c47e48da03caf69cd00a9369a1ed0f3565fb55bd9e6b197f4659763ed2407bfa20ae5

    Score
    6/10
    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Discovery

            Execution

              Exfiltration

                Impact

                  Initial Access

                    Lateral Movement

                      Persistence

                        Privilege Escalation