General

  • Target

    74eac606b1976d66e57914bd947c94e4b6f4418cc7e5349d16a91960b7cb84fc

  • Size

    6.9MB

  • Sample

    221122-ykb4mafb45

  • MD5

    4738a74e689eb8d244a3dce88ff92416

  • SHA1

    b7e18dc6ea6f26bbe363bd10931d434f58469481

  • SHA256

    74eac606b1976d66e57914bd947c94e4b6f4418cc7e5349d16a91960b7cb84fc

  • SHA512

    1bd2cf97286cfdcd54b487598c7fcdb4d94c9b0438f309602f9b3e7a9350fd9610ff5017800cb2211eb2265639721b9d934f8e8f5a5dfdb9183f79ee628d2abe

  • SSDEEP

    98304:tgsBb3H5va6PnxrN7S17c89M3Ik9imFcpJ4Ednf4U8BAapeRytceIe+fLFsiSlSq:tgEt9lNuK3b0r1nv8OapeAtYPmzcp2

Score
7/10

Malware Config

Targets

    • Target

      74eac606b1976d66e57914bd947c94e4b6f4418cc7e5349d16a91960b7cb84fc

    • Size

      6.9MB

    • MD5

      4738a74e689eb8d244a3dce88ff92416

    • SHA1

      b7e18dc6ea6f26bbe363bd10931d434f58469481

    • SHA256

      74eac606b1976d66e57914bd947c94e4b6f4418cc7e5349d16a91960b7cb84fc

    • SHA512

      1bd2cf97286cfdcd54b487598c7fcdb4d94c9b0438f309602f9b3e7a9350fd9610ff5017800cb2211eb2265639721b9d934f8e8f5a5dfdb9183f79ee628d2abe

    • SSDEEP

      98304:tgsBb3H5va6PnxrN7S17c89M3Ik9imFcpJ4Ednf4U8BAapeRytceIe+fLFsiSlSq:tgEt9lNuK3b0r1nv8OapeAtYPmzcp2

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks