General

  • Target

    cfe5f6d189dd239a0680dc28a42dfd32f300f201e77bee56f1b906ac9e805b21

  • Size

    2.2MB

  • Sample

    220701-dxsxpaaadj

  • MD5

    204faf1feffff0149e5f728b50a8a173

  • SHA1

    164d6b688410cacacba974346337506c67e092ca

  • SHA256

    cfe5f6d189dd239a0680dc28a42dfd32f300f201e77bee56f1b906ac9e805b21

  • SHA512

    343e264cd1c351eda9dead25a4d75ab65ca5ae6a3231e7072d3aa12987ce06a2ea691bc57e8fa744f68ae76ce173878c74b821332f5b5d04dad2693ba96a879f

Score
7/10

Malware Config

Targets

    • Target

      cfe5f6d189dd239a0680dc28a42dfd32f300f201e77bee56f1b906ac9e805b21

    • Size

      2.2MB

    • MD5

      204faf1feffff0149e5f728b50a8a173

    • SHA1

      164d6b688410cacacba974346337506c67e092ca

    • SHA256

      cfe5f6d189dd239a0680dc28a42dfd32f300f201e77bee56f1b906ac9e805b21

    • SHA512

      343e264cd1c351eda9dead25a4d75ab65ca5ae6a3231e7072d3aa12987ce06a2ea691bc57e8fa744f68ae76ce173878c74b821332f5b5d04dad2693ba96a879f

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks