General

  • Target

    a50b4ef8dd98b9f3c7395fb23aab668c4c9eba0c8478ad2a254860c8c2b068f1

  • Size

    2.8MB

  • Sample

    220701-g2j25ahbg7

  • MD5

    4a41bf13e73b7b2041e3b7f806e02e9c

  • SHA1

    1007d6dc47ad8914dcac1dcde45c12cd651f0c74

  • SHA256

    a50b4ef8dd98b9f3c7395fb23aab668c4c9eba0c8478ad2a254860c8c2b068f1

  • SHA512

    23a309d8972380d347fcde435af45f2369b93962978435d2bdfa9ca0dbf8a2f3a46eccaf3221a856fdffb090b4d72b35cf350e154d66667eae2c9f3a5aaa6db3

Malware Config

Targets

    • Target

      a50b4ef8dd98b9f3c7395fb23aab668c4c9eba0c8478ad2a254860c8c2b068f1

    • Size

      2.8MB

    • MD5

      4a41bf13e73b7b2041e3b7f806e02e9c

    • SHA1

      1007d6dc47ad8914dcac1dcde45c12cd651f0c74

    • SHA256

      a50b4ef8dd98b9f3c7395fb23aab668c4c9eba0c8478ad2a254860c8c2b068f1

    • SHA512

      23a309d8972380d347fcde435af45f2369b93962978435d2bdfa9ca0dbf8a2f3a46eccaf3221a856fdffb090b4d72b35cf350e154d66667eae2c9f3a5aaa6db3

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks