General

  • Target

    e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df

  • Size

    438KB

  • Sample

    221123-xjxhhafb95

  • MD5

    4f90c9fb3ee8cb50bfa20a419b2ed5af

  • SHA1

    671fc353c614eaac33569765626d466620cc350f

  • SHA256

    e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df

  • SHA512

    032ffd65ae36a554dae56cd375161358218c885c28eebbc702bdc0397f86d0a927730afcd0c880351c18df105fe98c9c86c1f7ff2cd43d281529f328ad4962fb

  • SSDEEP

    6144:pxko+hPu2HlS2jY1E6prsVYkGaxKFTpCyAfGx0SPObTCXaP8tGhuip:p6hPu2FS0Y1oFxKrQJEKTCXaPLhuip

Malware Config

Targets

    • Target

      e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df

    • Size

      438KB

    • MD5

      4f90c9fb3ee8cb50bfa20a419b2ed5af

    • SHA1

      671fc353c614eaac33569765626d466620cc350f

    • SHA256

      e4e1161a74521f30a7606d7971a67c965a93e94c079915a114f2495ed34e31df

    • SHA512

      032ffd65ae36a554dae56cd375161358218c885c28eebbc702bdc0397f86d0a927730afcd0c880351c18df105fe98c9c86c1f7ff2cd43d281529f328ad4962fb

    • SSDEEP

      6144:pxko+hPu2HlS2jY1E6prsVYkGaxKFTpCyAfGx0SPObTCXaP8tGhuip:p6hPu2FS0Y1oFxKrQJEKTCXaPLhuip

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks