General

  • Target

    cb427c664d3dcdba9d3fd931a6d1ec464b6bdfcb8a12f951a977aafd6b9bc1be

  • Size

    485KB

  • Sample

    221122-ykke1aae9z

  • MD5

    e4b3b99a53dc6b9998e191c52c15abea

  • SHA1

    701f5879801d4a8e99984b807fad377603be060b

  • SHA256

    cb427c664d3dcdba9d3fd931a6d1ec464b6bdfcb8a12f951a977aafd6b9bc1be

  • SHA512

    548e212bc7ca072f06402a61cd733ba9b392daec9385e6cb1a5fe32103c91ed78465d73136e786fc929113b2028eb96a77ee6b6a442f604389cac88bb8835a9d

  • SSDEEP

    6144:2/MZbT9PWzKNg4T2tvMTkyEyZw6cOFvYol4AnlrBlXsOruDwz++sHdsCJeRF:ge39e+akM+hx/BlrjN++s3U

Malware Config

Targets

    • Target

      cb427c664d3dcdba9d3fd931a6d1ec464b6bdfcb8a12f951a977aafd6b9bc1be

    • Size

      485KB

    • MD5

      e4b3b99a53dc6b9998e191c52c15abea

    • SHA1

      701f5879801d4a8e99984b807fad377603be060b

    • SHA256

      cb427c664d3dcdba9d3fd931a6d1ec464b6bdfcb8a12f951a977aafd6b9bc1be

    • SHA512

      548e212bc7ca072f06402a61cd733ba9b392daec9385e6cb1a5fe32103c91ed78465d73136e786fc929113b2028eb96a77ee6b6a442f604389cac88bb8835a9d

    • SSDEEP

      6144:2/MZbT9PWzKNg4T2tvMTkyEyZw6cOFvYol4AnlrBlXsOruDwz++sHdsCJeRF:ge39e+akM+hx/BlrjN++s3U

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks