General

  • Target

    d20f48dad369657704bb7dccc361049cd0763435405cd4da256bbfdd26f9d854

  • Size

    6.9MB

  • Sample

    221122-yj8q7sfb43

  • MD5

    681678523de51d13845759f4a2a61bed

  • SHA1

    b060a7c7fef81b0d078f726dd75c7d3d948b7ab5

  • SHA256

    d20f48dad369657704bb7dccc361049cd0763435405cd4da256bbfdd26f9d854

  • SHA512

    058f117655c37d64339563a55ccb420dc3d0be532bb5f2f011fc77e4cfcab771c8b420b051fee6197655c47b3f0ee458647cf1d681f697051f96aa133fdea9b9

  • SSDEEP

    98304:qgsBb3H5va6PnxrN7S17c89M3Ik9imFcpJ4Ednf4U8BAapeRytceWF+fLFsiSlSS:qgEt9lNuK3b0r1nv8OapeAttmzcpW

Score
7/10

Malware Config

Targets

    • Target

      d20f48dad369657704bb7dccc361049cd0763435405cd4da256bbfdd26f9d854

    • Size

      6.9MB

    • MD5

      681678523de51d13845759f4a2a61bed

    • SHA1

      b060a7c7fef81b0d078f726dd75c7d3d948b7ab5

    • SHA256

      d20f48dad369657704bb7dccc361049cd0763435405cd4da256bbfdd26f9d854

    • SHA512

      058f117655c37d64339563a55ccb420dc3d0be532bb5f2f011fc77e4cfcab771c8b420b051fee6197655c47b3f0ee458647cf1d681f697051f96aa133fdea9b9

    • SSDEEP

      98304:qgsBb3H5va6PnxrN7S17c89M3Ik9imFcpJ4Ednf4U8BAapeRytceWF+fLFsiSlSS:qgEt9lNuK3b0r1nv8OapeAttmzcpW

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks