General

  • Target

    d6508290731bb66b2909cc8b7764c607a3fe4b32a5ffd898190387646075071a

  • Size

    263KB

  • Sample

    220630-xrrxzshben

  • MD5

    9b11738027764e6597ae84cf6e3d84d2

  • SHA1

    c722aff5b453252dd1f81b865edd699701ab2219

  • SHA256

    d6508290731bb66b2909cc8b7764c607a3fe4b32a5ffd898190387646075071a

  • SHA512

    f09f46f7ecbc344bff14bd05058237388eed07d37bd8773c5d0b21e5f526e549029fac28be6956579da80555ea6e54d0d0d34a6558ea3403b1644192ca5d5cd8

Malware Config

Targets

    • Target

      d6508290731bb66b2909cc8b7764c607a3fe4b32a5ffd898190387646075071a

    • Size

      263KB

    • MD5

      9b11738027764e6597ae84cf6e3d84d2

    • SHA1

      c722aff5b453252dd1f81b865edd699701ab2219

    • SHA256

      d6508290731bb66b2909cc8b7764c607a3fe4b32a5ffd898190387646075071a

    • SHA512

      f09f46f7ecbc344bff14bd05058237388eed07d37bd8773c5d0b21e5f526e549029fac28be6956579da80555ea6e54d0d0d34a6558ea3403b1644192ca5d5cd8

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks