General

  • Target

    4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6

  • Size

    1.5MB

  • Sample

    221123-sv4nqscc87

  • MD5

    e3bc906963bccbef2ebabc0bce502849

  • SHA1

    39ef3902e8fe286377b658b6b93b3d4122b95a30

  • SHA256

    4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6

  • SHA512

    ad42f6219ed8ea760494adffa79b802c12e02436e12576adb3497ac2c26bf721ef8ea85f70a7ee1b40e9bf73334cc33a0d466712433cc5d189e4f900db567f9c

  • SSDEEP

    49152:9OuOYmbclX4jwfzK3XRuV8et30MImJr7SX2KTwQ:IuPqwfWQVft30MIWr7c9

Malware Config

Targets

    • Target

      4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6

    • Size

      1.5MB

    • MD5

      e3bc906963bccbef2ebabc0bce502849

    • SHA1

      39ef3902e8fe286377b658b6b93b3d4122b95a30

    • SHA256

      4a5f77bdb11ea4b871a7f19e629916702790c89494831cf0279b70a2de22d2f6

    • SHA512

      ad42f6219ed8ea760494adffa79b802c12e02436e12576adb3497ac2c26bf721ef8ea85f70a7ee1b40e9bf73334cc33a0d466712433cc5d189e4f900db567f9c

    • SSDEEP

      49152:9OuOYmbclX4jwfzK3XRuV8et30MImJr7SX2KTwQ:IuPqwfWQVft30MIWr7c9

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Reads the content of SMS inbox messages.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks