General

  • Target

    5b377d73f0da400b8e5da33a701a9d5f7a42fe6aaaeb3f6fd996f4d5fbf1761b

  • Size

    427KB

  • Sample

    221011-ypzqgscbdr

  • MD5

    056d4e0dee2ed3bae61a3f448d4a079c

  • SHA1

    43a23cfc4fd5ae9b41f20734ff78d845254fe45b

  • SHA256

    5b377d73f0da400b8e5da33a701a9d5f7a42fe6aaaeb3f6fd996f4d5fbf1761b

  • SHA512

    f1be4472071583f3912232e555c47d5b9a64e4b6f580c6f6348159d19cfef44519963c7d392b5c578af211649a7237d2d8262b5852a4ba7c8d30f87ffe213757

  • SSDEEP

    6144:S/cwt/wfktf1KrgnX28rxxim/m60lzNUXxTo7J1jSguZzdR4LxuzkM:62fktf1KrSX28Wm+HlKx6vSggBR4LoZ

Malware Config

Targets

    • Target

      5b377d73f0da400b8e5da33a701a9d5f7a42fe6aaaeb3f6fd996f4d5fbf1761b

    • Size

      427KB

    • MD5

      056d4e0dee2ed3bae61a3f448d4a079c

    • SHA1

      43a23cfc4fd5ae9b41f20734ff78d845254fe45b

    • SHA256

      5b377d73f0da400b8e5da33a701a9d5f7a42fe6aaaeb3f6fd996f4d5fbf1761b

    • SHA512

      f1be4472071583f3912232e555c47d5b9a64e4b6f580c6f6348159d19cfef44519963c7d392b5c578af211649a7237d2d8262b5852a4ba7c8d30f87ffe213757

    • SSDEEP

      6144:S/cwt/wfktf1KrgnX28rxxim/m60lzNUXxTo7J1jSguZzdR4LxuzkM:62fktf1KrSX28Wm+HlKx6vSggBR4LoZ

    Score
    7/10
    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks