General

  • Target

    462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e

  • Size

    5.3MB

  • Sample

    220521-pn37vaahdp

  • MD5

    9d0757f629579ab19fdf75b1404d6a67

  • SHA1

    531b894b619557ec891a8d41d2e6cabb59f055d6

  • SHA256

    462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e

  • SHA512

    dd738196aae7dc021b7ec3f64b8d1c6d533d58187865053ae0fb006f3a851303a2ba6594a719e558303c0d62264d192a8f2e8e446de5370ddd67edfa18f813df

Score
7/10

Malware Config

Targets

    • Target

      462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e

    • Size

      5.3MB

    • MD5

      9d0757f629579ab19fdf75b1404d6a67

    • SHA1

      531b894b619557ec891a8d41d2e6cabb59f055d6

    • SHA256

      462fd3c4ef91190d0916725fe4e0d5dd09657199495a270a28279128f08f435e

    • SHA512

      dd738196aae7dc021b7ec3f64b8d1c6d533d58187865053ae0fb006f3a851303a2ba6594a719e558303c0d62264d192a8f2e8e446de5370ddd67edfa18f813df

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks