66096ffbeab196c7221adda9696f02c41a194792a7773d9f3b7043f20c84faa4

General
Target

66096ffbeab196c7221adda9696f02c41a194792a7773d9f3b7043f20c84faa4

Size

5MB

Sample

220521-p28z9agea7

Score
7 /10
MD5

04964c79de48c05ca011f2caa9ef7799

SHA1

b2daa1e20e90b1d811679ed0373113c9c7357467

SHA256

66096ffbeab196c7221adda9696f02c41a194792a7773d9f3b7043f20c84faa4

SHA512

1888feef880470ba168ec84e157a68d7f2b2d4ae3b2fd80ca914558ff41c47e48da03caf69cd00a9369a1ed0f3565fb55bd9e6b197f4659763ed2407bfa20ae5

Malware Config
Targets
Target

66096ffbeab196c7221adda9696f02c41a194792a7773d9f3b7043f20c84faa4

MD5

04964c79de48c05ca011f2caa9ef7799

Filesize

5MB

Score
6/10
SHA1

b2daa1e20e90b1d811679ed0373113c9c7357467

SHA256

66096ffbeab196c7221adda9696f02c41a194792a7773d9f3b7043f20c84faa4

SHA512

1888feef880470ba168ec84e157a68d7f2b2d4ae3b2fd80ca914558ff41c47e48da03caf69cd00a9369a1ed0f3565fb55bd9e6b197f4659763ed2407bfa20ae5

Tags

Signatures

  • Reads information about phone network operator.

  • Uses Crypto APIs (Might try to encrypt user data).

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          7/10

                          behavioral1

                          6/10

                          behavioral2

                          1/10

                          behavioral3

                          1/10