General

  • Target

    b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b

  • Size

    1.6MB

  • Sample

    221123-sq9n7aca44

  • MD5

    a52ff18b7677432d274f28bdb766cf57

  • SHA1

    281d6161ae3631c25b24f23b5a52d107540a8c43

  • SHA256

    b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b

  • SHA512

    b41dddaa201ed614bb9efb9ef67ae0dd5b70d19bb6f9d596ae46710f73714c2e78f7f870aa8dc74bed64937b7383fe1644fb5a73776c9cec93cf42bfd3b7febd

  • SSDEEP

    24576:T4yfMMDZWG4iGjTGbx0ECAEokpJ4K9mLbM6qq5MLlIa5N+qMYayebwQSsMWl61gE:v0M0/aqyjeJygU5uXYqydSLWlFkn

Malware Config

Targets

    • Target

      b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b

    • Size

      1.6MB

    • MD5

      a52ff18b7677432d274f28bdb766cf57

    • SHA1

      281d6161ae3631c25b24f23b5a52d107540a8c43

    • SHA256

      b5a2efa986f1e143d80be46995ab91bdff3cee1ca17f19b38222de7c4226ce1b

    • SHA512

      b41dddaa201ed614bb9efb9ef67ae0dd5b70d19bb6f9d596ae46710f73714c2e78f7f870aa8dc74bed64937b7383fe1644fb5a73776c9cec93cf42bfd3b7febd

    • SSDEEP

      24576:T4yfMMDZWG4iGjTGbx0ECAEokpJ4K9mLbM6qq5MLlIa5N+qMYayebwQSsMWl61gE:v0M0/aqyjeJygU5uXYqydSLWlFkn

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks