4abc47fca2106c894e1dddcef227a447de3882c2a644869b93ace5f0f86a3fb4

General
Target

4abc47fca2106c894e1dddcef227a447de3882c2a644869b93ace5f0f86a3fb4

Size

5MB

Sample

220521-p3kn2sgec2

Score
7 /10
MD5

7fc1a57235b20ac2f1d4565c6025e0e5

SHA1

0e709eff66a44fd6f7c3187a8e4d9049051b7b32

SHA256

4abc47fca2106c894e1dddcef227a447de3882c2a644869b93ace5f0f86a3fb4

SHA512

7b83f96d71ac7385bde081c0705a5075346645fa855d7850b65fecdc5285aafe708464c5f56858554812291b46c2642f371ccf6ea75d50174ce7999eb144d3a5

Malware Config
Targets
Target

4abc47fca2106c894e1dddcef227a447de3882c2a644869b93ace5f0f86a3fb4

MD5

7fc1a57235b20ac2f1d4565c6025e0e5

Filesize

5MB

Score
7/10
SHA1

0e709eff66a44fd6f7c3187a8e4d9049051b7b32

SHA256

4abc47fca2106c894e1dddcef227a447de3882c2a644869b93ace5f0f86a3fb4

SHA512

7b83f96d71ac7385bde081c0705a5075346645fa855d7850b65fecdc5285aafe708464c5f56858554812291b46c2642f371ccf6ea75d50174ce7999eb144d3a5

Tags

Signatures

  • Queries the unique device ID (IMEI, MEID, IMSI).

  • Reads information about phone network operator.

  • Uses Crypto APIs (Might try to encrypt user data).

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          7/10

                          behavioral1

                          6/10

                          behavioral2

                          1/10

                          behavioral3

                          7/10