General

  • Target

    3b3ded06f9e67e10bc3fa3a451085dbd6fd107523e39d728342ebded0e27514c

  • Size

    431KB

  • Sample

    220703-vn81zshfer

  • MD5

    4fc434b4326047f3fe044d46efbc02b1

  • SHA1

    a339938b48d8c80e8fea837e7954e33a74b6d332

  • SHA256

    3b3ded06f9e67e10bc3fa3a451085dbd6fd107523e39d728342ebded0e27514c

  • SHA512

    bb3992644983603aa00bc4a6f5b0af3dc86a453d2f4277bff45fc290a1719a1d3b1fdbc14fa1f01daa8666f9a25eca6ffd97f2e28ee4c639e7b4c603a3528322

Malware Config

Targets

    • Target

      3b3ded06f9e67e10bc3fa3a451085dbd6fd107523e39d728342ebded0e27514c

    • Size

      431KB

    • MD5

      4fc434b4326047f3fe044d46efbc02b1

    • SHA1

      a339938b48d8c80e8fea837e7954e33a74b6d332

    • SHA256

      3b3ded06f9e67e10bc3fa3a451085dbd6fd107523e39d728342ebded0e27514c

    • SHA512

      bb3992644983603aa00bc4a6f5b0af3dc86a453d2f4277bff45fc290a1719a1d3b1fdbc14fa1f01daa8666f9a25eca6ffd97f2e28ee4c639e7b4c603a3528322

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks