General
Target

462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e

Size

5MB

Sample

220521-pn37vaahdp

Score
7/10
MD5

9d0757f629579ab19fdf75b1404d6a67

SHA1

531b894b619557ec891a8d41d2e6cabb59f055d6

SHA256

462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e

SHA512

dd738196aae7dc021b7ec3f64b8d1c6d533d58187865053ae0fb006f3a851303a2ba6594a719e558303c0d62264d192a8f2e8e446de5370ddd67edfa18f813df

Malware Config
Targets
Target

462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e

MD5

9d0757f629579ab19fdf75b1404d6a67

Filesize

5MB

Score
7/10
SHA1

531b894b619557ec891a8d41d2e6cabb59f055d6

SHA256

462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e

SHA512

dd738196aae7dc021b7ec3f64b8d1c6d533d58187865053ae0fb006f3a851303a2ba6594a719e558303c0d62264d192a8f2e8e446de5370ddd67edfa18f813df

Tags

Signatures

  • Loads dropped Dex/Jar

    Description

    Runs executable file dropped to the device during analysis.

  • Requests dangerous framework permissions

  • Reads information about phone network operator.

  • Uses Crypto APIs (Might try to encrypt user data).

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          Score
                          7/10

                          behavioral1

                          Score
                          7/10