General

  • Target

    c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187

  • Size

    1.5MB

  • Sample

    220701-gwyy4afcbk

  • MD5

    24e50862d94f40c163de0cff6043096b

  • SHA1

    caa7a20919259762c07c42016e177897cb2b8296

  • SHA256

    c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187

  • SHA512

    f8048af12b41b7fb130df18b48c6fc2c014193dbf39715818f027506ce5455745663626010f281bbbadb6b6fc5b7ccbefdb0226c363de6767b2670c87013027a

Score
7/10

Malware Config

Targets

    • Target

      c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187

    • Size

      1.5MB

    • MD5

      24e50862d94f40c163de0cff6043096b

    • SHA1

      caa7a20919259762c07c42016e177897cb2b8296

    • SHA256

      c46aba6e5bb2c2c0e61598d488d798f93d9ec237030c2f7ee7561a7cb2403187

    • SHA512

      f8048af12b41b7fb130df18b48c6fc2c014193dbf39715818f027506ce5455745663626010f281bbbadb6b6fc5b7ccbefdb0226c363de6767b2670c87013027a

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks