General

  • Target

    a8f12cb370d5634277a7141a8979dfa27d931ef2d6619fad8eca3022e00c141a

  • Size

    6.9MB

  • Sample

    221122-ykakssae8x

  • MD5

    fd6476927d8b4ff397a2903390b1feec

  • SHA1

    3fa5cf111c12600cdcac2946de98db6af8aa5f68

  • SHA256

    a8f12cb370d5634277a7141a8979dfa27d931ef2d6619fad8eca3022e00c141a

  • SHA512

    50b741ce0a79cae2f28ad4ae621319fe352adecb8339b8e82719967c6103c8f808d9100c7e4dd0f699016166a2238defd03c3b46594f5c2ca3958d792deae777

  • SSDEEP

    98304:ogsBb3H5va6PnxrN7S17c89M3Ik9imFcpJ4Ednf4U8BAapeRytcp1e+fLFsiSlS8:ogEt9lNuK3b0r1nv8OapeAtKmzcpg

Score
7/10

Malware Config

Targets

    • Target

      a8f12cb370d5634277a7141a8979dfa27d931ef2d6619fad8eca3022e00c141a

    • Size

      6.9MB

    • MD5

      fd6476927d8b4ff397a2903390b1feec

    • SHA1

      3fa5cf111c12600cdcac2946de98db6af8aa5f68

    • SHA256

      a8f12cb370d5634277a7141a8979dfa27d931ef2d6619fad8eca3022e00c141a

    • SHA512

      50b741ce0a79cae2f28ad4ae621319fe352adecb8339b8e82719967c6103c8f808d9100c7e4dd0f699016166a2238defd03c3b46594f5c2ca3958d792deae777

    • SSDEEP

      98304:ogsBb3H5va6PnxrN7S17c89M3Ik9imFcpJ4Ednf4U8BAapeRytcp1e+fLFsiSlS8:ogEt9lNuK3b0r1nv8OapeAtKmzcpg

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks