General

  • Target

    178ab6fa22c3c09b51f2fbc63da79503cfff129306726dc54a0f3f53b4cd26f6

  • Size

    10.8MB

  • Sample

    220630-yd3yrsacgl

  • MD5

    07c83f10f3551167e344be567df3af28

  • SHA1

    bb06c48fab54ce945231e9753772a163e80b64ab

  • SHA256

    178ab6fa22c3c09b51f2fbc63da79503cfff129306726dc54a0f3f53b4cd26f6

  • SHA512

    4f3d589de1a119458ad5f4ae3f69f18cebc3278ad2fa423914341326676322bc48423116ec53cbdd8c7b352dd30275ba4a498bde56944e6a8bd0895234550ac0

Score
7/10

Malware Config

Targets

    • Target

      178ab6fa22c3c09b51f2fbc63da79503cfff129306726dc54a0f3f53b4cd26f6

    • Size

      10.8MB

    • MD5

      07c83f10f3551167e344be567df3af28

    • SHA1

      bb06c48fab54ce945231e9753772a163e80b64ab

    • SHA256

      178ab6fa22c3c09b51f2fbc63da79503cfff129306726dc54a0f3f53b4cd26f6

    • SHA512

      4f3d589de1a119458ad5f4ae3f69f18cebc3278ad2fa423914341326676322bc48423116ec53cbdd8c7b352dd30275ba4a498bde56944e6a8bd0895234550ac0

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks