General

  • Target

    3e308efc8141814f3f51df09bac86b0a8918fd882bdc1da308ab514d973f8855

  • Size

    436KB

  • Sample

    220701-j7sybsbegn

  • MD5

    9a5982b23fb13fd37b81ebd95ea5c534

  • SHA1

    3ef5cb8f9b6030556aae781fdf570474aeb0b186

  • SHA256

    3e308efc8141814f3f51df09bac86b0a8918fd882bdc1da308ab514d973f8855

  • SHA512

    92454334b2dd9c11a482401f2e5a1e7dda9594fd4518ec465ea67d7466d2b4a15932ca01d5c657e6956de47453555f42e7ec488983e3eaaccdcadad0f366f962

Score
7/10

Malware Config

Targets

    • Target

      3e308efc8141814f3f51df09bac86b0a8918fd882bdc1da308ab514d973f8855

    • Size

      436KB

    • MD5

      9a5982b23fb13fd37b81ebd95ea5c534

    • SHA1

      3ef5cb8f9b6030556aae781fdf570474aeb0b186

    • SHA256

      3e308efc8141814f3f51df09bac86b0a8918fd882bdc1da308ab514d973f8855

    • SHA512

      92454334b2dd9c11a482401f2e5a1e7dda9594fd4518ec465ea67d7466d2b4a15932ca01d5c657e6956de47453555f42e7ec488983e3eaaccdcadad0f366f962

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks