General

  • Target

    137ee16e3d8a1ec0840d148be31544d73ea39115c2cb758085e811b1ff42cf18

  • Size

    19.9MB

  • Sample

    220630-x1n8fshfak

  • MD5

    51ab3bab5f3995e250d36874598bab12

  • SHA1

    f07ecff0ffad9877cf63d36b6726e68b0ae68da8

  • SHA256

    137ee16e3d8a1ec0840d148be31544d73ea39115c2cb758085e811b1ff42cf18

  • SHA512

    8c84bf57ff721b0035927347f4a556a6c2e0d5164465d8747558acb66bad568f23962a5ecc335ac53e8f9b8c1e51fdcb339fe7f8b2b987aa4b368a66e113a040

Score
7/10

Malware Config

Targets

    • Target

      137ee16e3d8a1ec0840d148be31544d73ea39115c2cb758085e811b1ff42cf18

    • Size

      19.9MB

    • MD5

      51ab3bab5f3995e250d36874598bab12

    • SHA1

      f07ecff0ffad9877cf63d36b6726e68b0ae68da8

    • SHA256

      137ee16e3d8a1ec0840d148be31544d73ea39115c2cb758085e811b1ff42cf18

    • SHA512

      8c84bf57ff721b0035927347f4a556a6c2e0d5164465d8747558acb66bad568f23962a5ecc335ac53e8f9b8c1e51fdcb339fe7f8b2b987aa4b368a66e113a040

    Score
    7/10
    • Checks Android system properties for emulator presence.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks