General

  • Target

    d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926

  • Size

    1.6MB

  • Sample

    221123-sq83naca43

  • MD5

    6e1a642728ec61cca2c480c28421f9a6

  • SHA1

    86a7e7bdb651b523b419eb9e2045f18f35a5c90f

  • SHA256

    d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926

  • SHA512

    a35f0b79eba748c0de938111094a6df2337752f1f9167223b0781f6ecdfaf8304f5d2fe0a3ff947972f70daef8c62bb93b734f9fd0bf704fcdf3ba3146d15757

  • SSDEEP

    24576:O4yfMMDZWG4iGjTGbx0ECAEokpJ4K9mLbM6qq5MLlIa5N+qMYayebwQSsMWl61ga:C0M0/aqyjeJygU5uXYqydSLWlFkh

Malware Config

Targets

    • Target

      d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926

    • Size

      1.6MB

    • MD5

      6e1a642728ec61cca2c480c28421f9a6

    • SHA1

      86a7e7bdb651b523b419eb9e2045f18f35a5c90f

    • SHA256

      d681719c51d99cd74d9e933f041525f9ea3687f6f6ce94ef6b59cf9af7e76926

    • SHA512

      a35f0b79eba748c0de938111094a6df2337752f1f9167223b0781f6ecdfaf8304f5d2fe0a3ff947972f70daef8c62bb93b734f9fd0bf704fcdf3ba3146d15757

    • SSDEEP

      24576:O4yfMMDZWG4iGjTGbx0ECAEokpJ4K9mLbM6qq5MLlIa5N+qMYayebwQSsMWl61ga:C0M0/aqyjeJygU5uXYqydSLWlFkh

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks