505a5ac24b74f4f5f232b6798746b679b8d3d67f22ec91b0ee026ecb271b24fa

General
Target

505a5ac24b74f4f5f232b6798746b679b8d3d67f22ec91b0ee026ecb271b24fa

Size

5MB

Sample

220521-p3esssbfhk

Score
7 /10
MD5

765d92295018c43a1454a0407b083d76

SHA1

6352bb4e2e055188e89317315d3a3101abd3fecd

SHA256

505a5ac24b74f4f5f232b6798746b679b8d3d67f22ec91b0ee026ecb271b24fa

SHA512

6aa3c3ca7baa3e1015e8636df1990e51c8a474a8e795a456ca824911ec7baa0656b0258433f787f7aa0fe3256350cdcd1d597432fe4f7cf0a7573cda518db4bf

Malware Config
Targets
Target

505a5ac24b74f4f5f232b6798746b679b8d3d67f22ec91b0ee026ecb271b24fa

MD5

765d92295018c43a1454a0407b083d76

Filesize

5MB

Score
6/10
SHA1

6352bb4e2e055188e89317315d3a3101abd3fecd

SHA256

505a5ac24b74f4f5f232b6798746b679b8d3d67f22ec91b0ee026ecb271b24fa

SHA512

6aa3c3ca7baa3e1015e8636df1990e51c8a474a8e795a456ca824911ec7baa0656b0258433f787f7aa0fe3256350cdcd1d597432fe4f7cf0a7573cda518db4bf

Tags

Signatures

  • Reads information about phone network operator.

  • Uses Crypto APIs (Might try to encrypt user data).

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          7/10

                          behavioral1

                          6/10

                          behavioral2

                          1/10

                          behavioral3

                          1/10