General
Target

17a12d11c63d437422969999a2d1df17771cec7e25d0c196c0e6d491d73ad689

Size

15MB

Sample

220521-pmhvhsagej

Score
7/10
MD5

274f450d19efab70ce4f6fc525b214c1

SHA1

a4431eae194cd1b0e535b3d230fc679e5bc13c6b

SHA256

17a12d11c63d437422969999a2d1df17771cec7e25d0c196c0e6d491d73ad689

SHA512

08488905fe2943e3a2b8080d48634c1eae7002fbeaf63a28450dc1eb84a935c0eff87cd75d9ada1e652df02a253054b93a096988bf91c8436226ebbf2d67e30a

Malware Config
Targets
Target

17a12d11c63d437422969999a2d1df17771cec7e25d0c196c0e6d491d73ad689

MD5

274f450d19efab70ce4f6fc525b214c1

Filesize

15MB

Score
7/10
SHA1

a4431eae194cd1b0e535b3d230fc679e5bc13c6b

SHA256

17a12d11c63d437422969999a2d1df17771cec7e25d0c196c0e6d491d73ad689

SHA512

08488905fe2943e3a2b8080d48634c1eae7002fbeaf63a28450dc1eb84a935c0eff87cd75d9ada1e652df02a253054b93a096988bf91c8436226ebbf2d67e30a

Tags

Signatures

  • Loads dropped Dex/Jar

    Description

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

  • Uses Crypto APIs (Might try to encrypt user data).

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          Score
                          7/10

                          behavioral1

                          Score
                          7/10