General

  • Target

    4d96e21b964e29c8fb24495fa784fd2f26d063c65c331547e395a1e71bbd0254

  • Size

    177KB

  • Sample

    221124-c67a1afd9y

  • MD5

    4c1173f90356c70daa9ebe87c5ee3aad

  • SHA1

    504bccafb7e4660784e73cb6b741ce7ac4353836

  • SHA256

    4d96e21b964e29c8fb24495fa784fd2f26d063c65c331547e395a1e71bbd0254

  • SHA512

    f1118f700df04e45d08a7eb8571666936b4770c933c1a81f60d9ac5dc92c9e61ab62feff02e3334f310abf1cb7d69b41523714dd9679012a6440d2fe97f2f927

  • SSDEEP

    3072:7zFJPj/wBLiFLgMGgPC5+kAMEJG8G/GF17IHBGTU6A7WpXsi:dhwipdYfF86G12bxg

Malware Config

Targets

    • Target

      4d96e21b964e29c8fb24495fa784fd2f26d063c65c331547e395a1e71bbd0254

    • Size

      177KB

    • MD5

      4c1173f90356c70daa9ebe87c5ee3aad

    • SHA1

      504bccafb7e4660784e73cb6b741ce7ac4353836

    • SHA256

      4d96e21b964e29c8fb24495fa784fd2f26d063c65c331547e395a1e71bbd0254

    • SHA512

      f1118f700df04e45d08a7eb8571666936b4770c933c1a81f60d9ac5dc92c9e61ab62feff02e3334f310abf1cb7d69b41523714dd9679012a6440d2fe97f2f927

    • SSDEEP

      3072:7zFJPj/wBLiFLgMGgPC5+kAMEJG8G/GF17IHBGTU6A7WpXsi:dhwipdYfF86G12bxg

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks