General

  • Target

    6b21e15d334c24b9c0f32344f75af2d3436d0091d8bf8b054bde16910777a324

  • Size

    4.4MB

  • Sample

    220521-pnx1tsffh2

  • MD5

    7bff39bc604ea8e71302812f92dbdb3b

  • SHA1

    c35e8f737ebe4e600f0642d3206c772511a04933

  • SHA256

    6b21e15d334c24b9c0f32344f75af2d3436d0091d8bf8b054bde16910777a324

  • SHA512

    6757d8c530dc967dcb467b87c745e82b24c20a9bddd5c5be6b1421406865f97c10acd1bf8e880b9e4309970153a9aa297e2ae92ddd40d92ab823addd9615e95b

Score
7/10

Malware Config

Targets

    • Target

      6b21e15d334c24b9c0f32344f75af2d3436d0091d8bf8b054bde16910777a324

    • Size

      4.4MB

    • MD5

      7bff39bc604ea8e71302812f92dbdb3b

    • SHA1

      c35e8f737ebe4e600f0642d3206c772511a04933

    • SHA256

      6b21e15d334c24b9c0f32344f75af2d3436d0091d8bf8b054bde16910777a324

    • SHA512

      6757d8c530dc967dcb467b87c745e82b24c20a9bddd5c5be6b1421406865f97c10acd1bf8e880b9e4309970153a9aa297e2ae92ddd40d92ab823addd9615e95b

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks