General

  • Target

    961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6

  • Size

    1.9MB

  • Sample

    221123-sqd8aafa51

  • MD5

    58f160a021279cb9d149aa74a2c422e0

  • SHA1

    bcc970c3af6aa0286ec17abc3654eb1dfd5f05a8

  • SHA256

    961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6

  • SHA512

    dbde4a676d7268ef7ad8b97389154a7a65e725745e31a2ddd3108bc217e2a818826de514dd608acd124e9fbd02e74302f6e3f083dbc01b74199336f38e0a0a9d

  • SSDEEP

    49152:n/mlr3oSzljwnyxIP6PLBCKv8kgdmJPPFSBvX:/yr3oAsyiyPLD8zEJPPEvX

Malware Config

Targets

    • Target

      961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6

    • Size

      1.9MB

    • MD5

      58f160a021279cb9d149aa74a2c422e0

    • SHA1

      bcc970c3af6aa0286ec17abc3654eb1dfd5f05a8

    • SHA256

      961697c4fbb52511ac8f3b446b0b9670bc7fd5e13aacaad376444fbd339327c6

    • SHA512

      dbde4a676d7268ef7ad8b97389154a7a65e725745e31a2ddd3108bc217e2a818826de514dd608acd124e9fbd02e74302f6e3f083dbc01b74199336f38e0a0a9d

    • SSDEEP

      49152:n/mlr3oSzljwnyxIP6PLBCKv8kgdmJPPFSBvX:/yr3oAsyiyPLD8zEJPPEvX

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks