General

  • Target

    5064e69f26202b7f9cd335463a15ceb81ef39e0d63748f92f55820630589bf86

  • Size

    6.9MB

  • Sample

    221122-ykdbpaae8z

  • MD5

    88aa620b107b155f1b513bd439df561e

  • SHA1

    f5299e7794cd330093586197a586de6cc94a4e9e

  • SHA256

    5064e69f26202b7f9cd335463a15ceb81ef39e0d63748f92f55820630589bf86

  • SHA512

    d876274b32049401773d280dfeadb2f1d8d45999fabd24f94d197c6da9f1e3cde270bf3d2ce08b7bdebf71009237a2b04f7b44434bac335a39e337214fe538fb

  • SSDEEP

    98304:bgsBb3H5va6PnxrN7S17c89M3Ik9imFcpJ4Ednf4U8BAapeRytcp1e+fLFsiSlSM:bgEt9lNuK3b0r1nv8OapeAtKmzcpY

Score
7/10

Malware Config

Targets

    • Target

      5064e69f26202b7f9cd335463a15ceb81ef39e0d63748f92f55820630589bf86

    • Size

      6.9MB

    • MD5

      88aa620b107b155f1b513bd439df561e

    • SHA1

      f5299e7794cd330093586197a586de6cc94a4e9e

    • SHA256

      5064e69f26202b7f9cd335463a15ceb81ef39e0d63748f92f55820630589bf86

    • SHA512

      d876274b32049401773d280dfeadb2f1d8d45999fabd24f94d197c6da9f1e3cde270bf3d2ce08b7bdebf71009237a2b04f7b44434bac335a39e337214fe538fb

    • SSDEEP

      98304:bgsBb3H5va6PnxrN7S17c89M3Ik9imFcpJ4Ednf4U8BAapeRytcp1e+fLFsiSlSM:bgEt9lNuK3b0r1nv8OapeAtKmzcpY

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks