General

  • Target

    a09c90550d5ce77b16e01fb08a3542e2c77a3d84546a1086b33b1737b019c0ce

  • Size

    105KB

  • Sample

    220701-fpbpjsehc7

  • MD5

    9e57420abd7ac0491956bb0bd0044a9a

  • SHA1

    3cf23a5d5b84fa8a239805228786e2c529a99d06

  • SHA256

    a09c90550d5ce77b16e01fb08a3542e2c77a3d84546a1086b33b1737b019c0ce

  • SHA512

    318126c8a126b57b20baa3c689097393d0eb1c5ef1644896b5026df1ac29046207ebf532524b40cf1c9a59abd35bbe44a1cd812e449cbee2d5e1bd0f85c7ef54

Score
7/10

Malware Config

Targets

    • Target

      a09c90550d5ce77b16e01fb08a3542e2c77a3d84546a1086b33b1737b019c0ce

    • Size

      105KB

    • MD5

      9e57420abd7ac0491956bb0bd0044a9a

    • SHA1

      3cf23a5d5b84fa8a239805228786e2c529a99d06

    • SHA256

      a09c90550d5ce77b16e01fb08a3542e2c77a3d84546a1086b33b1737b019c0ce

    • SHA512

      318126c8a126b57b20baa3c689097393d0eb1c5ef1644896b5026df1ac29046207ebf532524b40cf1c9a59abd35bbe44a1cd812e449cbee2d5e1bd0f85c7ef54

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks