60258fe1482fc6968c0d0c2dc5cd7da0e8ce9b88bbf749dd0a648b0839c22120

General
Target

60258fe1482fc6968c0d0c2dc5cd7da0e8ce9b88bbf749dd0a648b0839c22120

Size

21MB

Sample

220521-xvglesfhar

Score
8 /10
MD5

6c44f70b5e5c988940c81d64e9f572ba

SHA1

b1f6250e627b81d0e6c85ba1a89f4a27db17b2da

SHA256

60258fe1482fc6968c0d0c2dc5cd7da0e8ce9b88bbf749dd0a648b0839c22120

SHA512

a3c29384c1f9fc6fa5e8a3b33fba871688f1ed78caa5f0dafbf711454bce714b1f680c5c44632e288a91d7c403ac37cb94cdf05dfc30627f32ce801b0e391784

Malware Config
Targets
Target

60258fe1482fc6968c0d0c2dc5cd7da0e8ce9b88bbf749dd0a648b0839c22120

MD5

6c44f70b5e5c988940c81d64e9f572ba

Filesize

21MB

Score
7/10
SHA1

b1f6250e627b81d0e6c85ba1a89f4a27db17b2da

SHA256

60258fe1482fc6968c0d0c2dc5cd7da0e8ce9b88bbf749dd0a648b0839c22120

SHA512

a3c29384c1f9fc6fa5e8a3b33fba871688f1ed78caa5f0dafbf711454bce714b1f680c5c44632e288a91d7c403ac37cb94cdf05dfc30627f32ce801b0e391784

Tags

Signatures

  • Loads dropped Dex/Jar

    Description

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

  • Uses Crypto APIs (Might try to encrypt user data).

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Tasks

                          static1

                          8/10

                          behavioral1

                          7/10

                          behavioral2

                          7/10