General

  • Target

    745bbad538ff7fa16ae6f81c6943cf0e4ab6d0f4c96e66bb39ecb31aa3d48992

  • Size

    1.0MB

  • Sample

    220521-pn8gkafga4

  • MD5

    024a4506743df5696c480c74ecc8ea79

  • SHA1

    847624b56729e624fb6df1e71244035e8d90d5ff

  • SHA256

    745bbad538ff7fa16ae6f81c6943cf0e4ab6d0f4c96e66bb39ecb31aa3d48992

  • SHA512

    ee666e33afc751508aafb88021162a652612b9d7c453b8375ce9e1c2eb4b94057037897330ca2d16ec6a84cc2a42b607da0463ad61837cf264b929fbb1219054

Score
7/10

Malware Config

Targets

    • Target

      745bbad538ff7fa16ae6f81c6943cf0e4ab6d0f4c96e66bb39ecb31aa3d48992

    • Size

      1.0MB

    • MD5

      024a4506743df5696c480c74ecc8ea79

    • SHA1

      847624b56729e624fb6df1e71244035e8d90d5ff

    • SHA256

      745bbad538ff7fa16ae6f81c6943cf0e4ab6d0f4c96e66bb39ecb31aa3d48992

    • SHA512

      ee666e33afc751508aafb88021162a652612b9d7c453b8375ce9e1c2eb4b94057037897330ca2d16ec6a84cc2a42b607da0463ad61837cf264b929fbb1219054

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks