51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17

General
Target

51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17

Size

3MB

Sample

220521-wy4ppaaeg8

Score
7 /10
MD5

a666bb01fdae5a339c6ac7037b739727

SHA1

313711a4d5c5271cd28f41ad83d8db3b19016d06

SHA256

51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17

SHA512

85ea213c9414d781f821db10e0736ed302497d258b5bab631d902f04373f3e7d12e9b56344efc743c153b4a603311b6ae00605ca322e1f5aab5810b21f306ff6

Malware Config
Targets
Target

51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17

MD5

a666bb01fdae5a339c6ac7037b739727

Filesize

3MB

Score
7/10
SHA1

313711a4d5c5271cd28f41ad83d8db3b19016d06

SHA256

51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17

SHA512

85ea213c9414d781f821db10e0736ed302497d258b5bab631d902f04373f3e7d12e9b56344efc743c153b4a603311b6ae00605ca322e1f5aab5810b21f306ff6

Tags

Signatures

  • Loads dropped Dex/Jar

    Description

    Runs executable file dropped to the device during analysis.

  • Queries the unique device ID (IMEI, MEID, IMSI).

  • Reads information about phone network operator.

  • Uses Crypto APIs (Might try to encrypt user data).

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          7/10

                          behavioral1

                          7/10