General

  • Target

    e7d3e49ace53db65ecadef374384499d881ec149e8ce05868a4134ec063eb7e0

  • Size

    451KB

  • Sample

    220701-fmxh8sdafr

  • MD5

    9c2f30121a562edbbc8df709bd6cb2b5

  • SHA1

    b6868897461d0507ef711cc96981cd35094211d9

  • SHA256

    e7d3e49ace53db65ecadef374384499d881ec149e8ce05868a4134ec063eb7e0

  • SHA512

    e2c64240c83444116c283eb8eb316d462813db310b99b8ffc372d69c2cb866cce9fe11649b0853d94d41b66dfac38db7913ad379536060ce234a60402278601a

Score
7/10

Malware Config

Targets

    • Target

      e7d3e49ace53db65ecadef374384499d881ec149e8ce05868a4134ec063eb7e0

    • Size

      451KB

    • MD5

      9c2f30121a562edbbc8df709bd6cb2b5

    • SHA1

      b6868897461d0507ef711cc96981cd35094211d9

    • SHA256

      e7d3e49ace53db65ecadef374384499d881ec149e8ce05868a4134ec063eb7e0

    • SHA512

      e2c64240c83444116c283eb8eb316d462813db310b99b8ffc372d69c2cb866cce9fe11649b0853d94d41b66dfac38db7913ad379536060ce234a60402278601a

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks