General

  • Target

    d2d83c437361726cd808d2895883573552bd8fe361a6026bdb0a38d4a084e7f9

  • Size

    755KB

  • Sample

    220701-f192gsdgbr

  • MD5

    ba260a22c4edd290e25d4573b52f7878

  • SHA1

    f0c9e0dc04c5f4180197a7f5bb857ed5b1405b9e

  • SHA256

    d2d83c437361726cd808d2895883573552bd8fe361a6026bdb0a38d4a084e7f9

  • SHA512

    b4a8f5e72ecfc2ee54a7a9e687d0858a24c01e16a84b98a40870344a968018cf3442e2d2c81dd9bcfb896b47aeb0b2318c6813d0bba0a7d71b739a45d765ff18

Score
7/10

Malware Config

Targets

    • Target

      d2d83c437361726cd808d2895883573552bd8fe361a6026bdb0a38d4a084e7f9

    • Size

      755KB

    • MD5

      ba260a22c4edd290e25d4573b52f7878

    • SHA1

      f0c9e0dc04c5f4180197a7f5bb857ed5b1405b9e

    • SHA256

      d2d83c437361726cd808d2895883573552bd8fe361a6026bdb0a38d4a084e7f9

    • SHA512

      b4a8f5e72ecfc2ee54a7a9e687d0858a24c01e16a84b98a40870344a968018cf3442e2d2c81dd9bcfb896b47aeb0b2318c6813d0bba0a7d71b739a45d765ff18

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks