General

  • Target

    955449d56a072cbdb39ed34a43fda7bb761be9219a4bc8dae807644388646e88

  • Size

    18.3MB

  • Sample

    220701-hwf9qahahn

  • MD5

    74211f570aac71d2b3a47f3d5c97517c

  • SHA1

    835679abc30245a98c763163b51cb85ec0eba10e

  • SHA256

    955449d56a072cbdb39ed34a43fda7bb761be9219a4bc8dae807644388646e88

  • SHA512

    8001995f1906e7a775fc5d78dc59cf64a24653d7567275ba651b5758bf07d88e117741c7c7df3284f5374b14a2065e1fc5813652438497726ec9a94934111c1b

Score
8/10

Malware Config

Targets

    • Target

      955449d56a072cbdb39ed34a43fda7bb761be9219a4bc8dae807644388646e88

    • Size

      18.3MB

    • MD5

      74211f570aac71d2b3a47f3d5c97517c

    • SHA1

      835679abc30245a98c763163b51cb85ec0eba10e

    • SHA256

      955449d56a072cbdb39ed34a43fda7bb761be9219a4bc8dae807644388646e88

    • SHA512

      8001995f1906e7a775fc5d78dc59cf64a24653d7567275ba651b5758bf07d88e117741c7c7df3284f5374b14a2065e1fc5813652438497726ec9a94934111c1b

    Score
    8/10
    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks