General

  • Target

    8fa738614fac831e19d8a66f4a1eba91e8b118ba7cb88e62e30f439e8e9bd292

  • Size

    164KB

  • Sample

    221003-b83vxsbbf5

  • MD5

    6b61e00fbb9e7e8623ee3bbafaa0baa0

  • SHA1

    f9dec9c47d9783c378a916193888aae96e5bf8a9

  • SHA256

    8fa738614fac831e19d8a66f4a1eba91e8b118ba7cb88e62e30f439e8e9bd292

  • SHA512

    35e5bffa49ceb26070d05975869bb1597b0809238dcce84298019d64248a274742b0e870882d4c796ee58439cf813219dc06fb8d0366dd597fa6179e6e669fca

  • SSDEEP

    3072:HLLUoPC5+kAMEJGjsDLGm17gTU6DhufmCtGu0eo44q2RNMhwX:rLU/fFj4Lr17BN6cfo4wX

Malware Config

Targets

    • Target

      8fa738614fac831e19d8a66f4a1eba91e8b118ba7cb88e62e30f439e8e9bd292

    • Size

      164KB

    • MD5

      6b61e00fbb9e7e8623ee3bbafaa0baa0

    • SHA1

      f9dec9c47d9783c378a916193888aae96e5bf8a9

    • SHA256

      8fa738614fac831e19d8a66f4a1eba91e8b118ba7cb88e62e30f439e8e9bd292

    • SHA512

      35e5bffa49ceb26070d05975869bb1597b0809238dcce84298019d64248a274742b0e870882d4c796ee58439cf813219dc06fb8d0366dd597fa6179e6e669fca

    • SSDEEP

      3072:HLLUoPC5+kAMEJGjsDLGm17gTU6DhufmCtGu0eo44q2RNMhwX:rLU/fFj4Lr17BN6cfo4wX

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks