General

  • Target

    10bf0bd6135318dfb0e88f9c21b7fa8d5f282617be9892691f4a4965a761083b

  • Size

    6.3MB

  • Sample

    220701-hv1a7shafm

  • MD5

    8f363c197351cdd4b0a5e7eb21d71de6

  • SHA1

    c00500292e17676e80eaefbae39097a129a2ffa3

  • SHA256

    10bf0bd6135318dfb0e88f9c21b7fa8d5f282617be9892691f4a4965a761083b

  • SHA512

    7561aa8046b7a98b1f645c1dcc3234d5cc283166b4c29f18b86c0d4c4f4b008f494c04677107835a79dfbd283b14e528200f122abdf978f9d4c85cfd9685904b

Score
7/10

Malware Config

Targets

    • Target

      10bf0bd6135318dfb0e88f9c21b7fa8d5f282617be9892691f4a4965a761083b

    • Size

      6.3MB

    • MD5

      8f363c197351cdd4b0a5e7eb21d71de6

    • SHA1

      c00500292e17676e80eaefbae39097a129a2ffa3

    • SHA256

      10bf0bd6135318dfb0e88f9c21b7fa8d5f282617be9892691f4a4965a761083b

    • SHA512

      7561aa8046b7a98b1f645c1dcc3234d5cc283166b4c29f18b86c0d4c4f4b008f494c04677107835a79dfbd283b14e528200f122abdf978f9d4c85cfd9685904b

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks