General

  • Target

    51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17

  • Size

    3.1MB

  • Sample

    220521-wy4ppaaeg8

  • MD5

    a666bb01fdae5a339c6ac7037b739727

  • SHA1

    313711a4d5c5271cd28f41ad83d8db3b19016d06

  • SHA256

    51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17

  • SHA512

    85ea213c9414d781f821db10e0736ed302497d258b5bab631d902f04373f3e7d12e9b56344efc743c153b4a603311b6ae00605ca322e1f5aab5810b21f306ff6

Score
7/10

Malware Config

Targets

    • Target

      51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17

    • Size

      3.1MB

    • MD5

      a666bb01fdae5a339c6ac7037b739727

    • SHA1

      313711a4d5c5271cd28f41ad83d8db3b19016d06

    • SHA256

      51bc3097e357f0d2ea3d322ee739b8eaaf3f5e4ac43fc20770b570858551fc17

    • SHA512

      85ea213c9414d781f821db10e0736ed302497d258b5bab631d902f04373f3e7d12e9b56344efc743c153b4a603311b6ae00605ca322e1f5aab5810b21f306ff6

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the unique device ID (IMEI, MEID, IMSI).

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks