General
Target

745bbad538ff7fa16ae6f81c6943cf0e4ab6d0f4c96e66bb39ecb31aa3d48992

Size

1MB

Sample

220521-pn8gkafga4

Score
7/10
MD5

024a4506743df5696c480c74ecc8ea79

SHA1

847624b56729e624fb6df1e71244035e8d90d5ff

SHA256

745bbad538ff7fa16ae6f81c6943cf0e4ab6d0f4c96e66bb39ecb31aa3d48992

SHA512

ee666e33afc751508aafb88021162a652612b9d7c453b8375ce9e1c2eb4b94057037897330ca2d16ec6a84cc2a42b607da0463ad61837cf264b929fbb1219054

Malware Config
Targets
Target

745bbad538ff7fa16ae6f81c6943cf0e4ab6d0f4c96e66bb39ecb31aa3d48992

MD5

024a4506743df5696c480c74ecc8ea79

Filesize

1MB

Score
7/10
SHA1

847624b56729e624fb6df1e71244035e8d90d5ff

SHA256

745bbad538ff7fa16ae6f81c6943cf0e4ab6d0f4c96e66bb39ecb31aa3d48992

SHA512

ee666e33afc751508aafb88021162a652612b9d7c453b8375ce9e1c2eb4b94057037897330ca2d16ec6a84cc2a42b607da0463ad61837cf264b929fbb1219054

Tags

Signatures

  • Loads dropped Dex/Jar

    Description

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

  • Uses Crypto APIs (Might try to encrypt user data).

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          Score
                          7/10

                          behavioral1

                          Score
                          7/10

                          behavioral2

                          Score
                          7/10

                          behavioral3

                          Score
                          7/10