General

  • Target

    3cd3be87d40527570990878436a0356c46ea0ce7c4d7a6b499a22bad56672ebf

  • Size

    2.9MB

  • Sample

    220703-fvf68agcfl

  • MD5

    b7a79e295f23fb51105282797d05d8f7

  • SHA1

    1de4a6a4395a45d6c1ec1c67cd27720ae9708034

  • SHA256

    3cd3be87d40527570990878436a0356c46ea0ce7c4d7a6b499a22bad56672ebf

  • SHA512

    766bbe6b46122f317dd0f7ccf2fb6f881dcb8967fc8b22e7338adf36868c2d3a3831a04667b1a06334e5ad1f529fa470546d17c98cdb33e7caebc702b38b3820

Score
7/10

Malware Config

Targets

    • Target

      3cd3be87d40527570990878436a0356c46ea0ce7c4d7a6b499a22bad56672ebf

    • Size

      2.9MB

    • MD5

      b7a79e295f23fb51105282797d05d8f7

    • SHA1

      1de4a6a4395a45d6c1ec1c67cd27720ae9708034

    • SHA256

      3cd3be87d40527570990878436a0356c46ea0ce7c4d7a6b499a22bad56672ebf

    • SHA512

      766bbe6b46122f317dd0f7ccf2fb6f881dcb8967fc8b22e7338adf36868c2d3a3831a04667b1a06334e5ad1f529fa470546d17c98cdb33e7caebc702b38b3820

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks