General

  • Target

    813d651e52d0ec8ffb53cb3a493d0a0a28efacbdd8d221bbf4a84128254aa3f7

  • Size

    432KB

  • Sample

    220701-dsjhfsbfa9

  • MD5

    08fdd07a5643eaa57a918c92a93107f4

  • SHA1

    ade1b573c1f5dbbbe00b2527b4800863aa4dcaba

  • SHA256

    813d651e52d0ec8ffb53cb3a493d0a0a28efacbdd8d221bbf4a84128254aa3f7

  • SHA512

    d66b14acef86f2a067c5a385a9b705f09361ebb18842186e4657615085705aa52a47f86d0c19cc6cd25dadc0105d7f4c3eb420eaea4c5748e35161eb0701be7e

Score
7/10

Malware Config

Targets

    • Target

      813d651e52d0ec8ffb53cb3a493d0a0a28efacbdd8d221bbf4a84128254aa3f7

    • Size

      432KB

    • MD5

      08fdd07a5643eaa57a918c92a93107f4

    • SHA1

      ade1b573c1f5dbbbe00b2527b4800863aa4dcaba

    • SHA256

      813d651e52d0ec8ffb53cb3a493d0a0a28efacbdd8d221bbf4a84128254aa3f7

    • SHA512

      d66b14acef86f2a067c5a385a9b705f09361ebb18842186e4657615085705aa52a47f86d0c19cc6cd25dadc0105d7f4c3eb420eaea4c5748e35161eb0701be7e

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks