General

  • Target

    4abc47fca2106c894e1dddcef227a447de3882c2a644869b93ace5f0f86a3fb4

  • Size

    5MB

  • Sample

    220521-p3kn2sgec2

  • MD5

    7fc1a57235b20ac2f1d4565c6025e0e5

  • SHA1

    0e709eff66a44fd6f7c3187a8e4d9049051b7b32

  • SHA256

    4abc47fca2106c894e1dddcef227a447de3882c2a644869b93ace5f0f86a3fb4

  • SHA512

    7b83f96d71ac7385bde081c0705a5075346645fa855d7850b65fecdc5285aafe708464c5f56858554812291b46c2642f371ccf6ea75d50174ce7999eb144d3a5

Score
7/10

Malware Config

Targets

    • Target

      4abc47fca2106c894e1dddcef227a447de3882c2a644869b93ace5f0f86a3fb4

    • Size

      5MB

    • MD5

      7fc1a57235b20ac2f1d4565c6025e0e5

    • SHA1

      0e709eff66a44fd6f7c3187a8e4d9049051b7b32

    • SHA256

      4abc47fca2106c894e1dddcef227a447de3882c2a644869b93ace5f0f86a3fb4

    • SHA512

      7b83f96d71ac7385bde081c0705a5075346645fa855d7850b65fecdc5285aafe708464c5f56858554812291b46c2642f371ccf6ea75d50174ce7999eb144d3a5

    Score
    7/10
    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Discovery

            Execution

              Exfiltration

                Impact

                  Initial Access

                    Lateral Movement

                      Persistence

                        Privilege Escalation