General

  • Target

    5f08de2de4135cacdfe75689cfa257ae32f52015d6f42da1da9a1e2e8ac858c7

  • Size

    546KB

  • Sample

    220701-hqrs9sggfk

  • MD5

    ca474685ba3514712cd67729fdae37ac

  • SHA1

    02439e47c7b8e5afdcba7f13da73c54fbfb0a673

  • SHA256

    5f08de2de4135cacdfe75689cfa257ae32f52015d6f42da1da9a1e2e8ac858c7

  • SHA512

    ea962f72339dcecc00f18076ca683a7769413bca722a62cd6be652faa37984ecbb523fdd4a11aae6cf2e6c0e5811c5ddcc07ab24d819c47536866bd4472d3c20

Score
7/10

Malware Config

Targets

    • Target

      5f08de2de4135cacdfe75689cfa257ae32f52015d6f42da1da9a1e2e8ac858c7

    • Size

      546KB

    • MD5

      ca474685ba3514712cd67729fdae37ac

    • SHA1

      02439e47c7b8e5afdcba7f13da73c54fbfb0a673

    • SHA256

      5f08de2de4135cacdfe75689cfa257ae32f52015d6f42da1da9a1e2e8ac858c7

    • SHA512

      ea962f72339dcecc00f18076ca683a7769413bca722a62cd6be652faa37984ecbb523fdd4a11aae6cf2e6c0e5811c5ddcc07ab24d819c47536866bd4472d3c20

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks