General

  • Target

    414f22419fbeff9ccd22942804f0c2923b13d7f62caa9c90a8b1552a756ff219

  • Size

    2.3MB

  • Sample

    220521-ppaxpaahfm

  • MD5

    889c507091e43d66a98abceab0ee8088

  • SHA1

    d3cc6c40d8921e44220d640bbf577a87444e01fb

  • SHA256

    414f22419fbeff9ccd22942804f0c2923b13d7f62caa9c90a8b1552a756ff219

  • SHA512

    cc20c8ec7298f7ae052529637477a78d7e75501b0c3530bf8309cf0895006b102d442bf5d21e11339b02c36b7aad2bf8e334cdb6cdfafce7c5d72e50a238554f

Score
7/10

Malware Config

Targets

    • Target

      414f22419fbeff9ccd22942804f0c2923b13d7f62caa9c90a8b1552a756ff219

    • Size

      2.3MB

    • MD5

      889c507091e43d66a98abceab0ee8088

    • SHA1

      d3cc6c40d8921e44220d640bbf577a87444e01fb

    • SHA256

      414f22419fbeff9ccd22942804f0c2923b13d7f62caa9c90a8b1552a756ff219

    • SHA512

      cc20c8ec7298f7ae052529637477a78d7e75501b0c3530bf8309cf0895006b102d442bf5d21e11339b02c36b7aad2bf8e334cdb6cdfafce7c5d72e50a238554f

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks