General

  • Target

    0d45fca53ea016e442dc78eae633ea8c8375bb76a5b0aa8030b2b64957183a32

  • Size

    533KB

  • Sample

    220521-xvnpqsfhbq

  • MD5

    05e2440fad6370aecd2ad0f8529ae3bd

  • SHA1

    6e13529e8c5aec5e7ebccd2e14f384a55104d038

  • SHA256

    0d45fca53ea016e442dc78eae633ea8c8375bb76a5b0aa8030b2b64957183a32

  • SHA512

    e4fb43f88f32e48f3fc57faee4ec7e147d2ebe6ac2176805b64c3537fbb595fdfc43fffa6cd5ee596b970a4ebd1388dcd814ae18c31f99e993534749eb31c4f6

Malware Config

Targets

    • Target

      0d45fca53ea016e442dc78eae633ea8c8375bb76a5b0aa8030b2b64957183a32

    • Size

      533KB

    • MD5

      05e2440fad6370aecd2ad0f8529ae3bd

    • SHA1

      6e13529e8c5aec5e7ebccd2e14f384a55104d038

    • SHA256

      0d45fca53ea016e442dc78eae633ea8c8375bb76a5b0aa8030b2b64957183a32

    • SHA512

      e4fb43f88f32e48f3fc57faee4ec7e147d2ebe6ac2176805b64c3537fbb595fdfc43fffa6cd5ee596b970a4ebd1388dcd814ae18c31f99e993534749eb31c4f6

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks