General

  • Target

    d6b2953e626c42bc362193e4ccd959e02831378b8238e565abb95691c9edead3

  • Size

    1.5MB

  • Sample

    221124-ddwt8scf48

  • MD5

    1f2aecb25c4fffe456d1bcdacba29704

  • SHA1

    e07e771039e55591fde9afdd84e0ad1ccf502271

  • SHA256

    d6b2953e626c42bc362193e4ccd959e02831378b8238e565abb95691c9edead3

  • SHA512

    688c0bf043ef905e8c353455a32291ab75939dcaee2829ec64173255293455f6e3912c38a9b6b6fd6befcae226a06be79aa996b9785b346bc30cb23565ba040b

  • SSDEEP

    24576:ywHUPzLpzA9YOSzhAuWQJLlfkOqkj9vUZ4KH5tkTar1euZf0s5R3Hmc3sHO:UPz1cYLnWQJOO39vUZ4KZGTabfz5R3Hb

Malware Config

Targets

    • Target

      d6b2953e626c42bc362193e4ccd959e02831378b8238e565abb95691c9edead3

    • Size

      1.5MB

    • MD5

      1f2aecb25c4fffe456d1bcdacba29704

    • SHA1

      e07e771039e55591fde9afdd84e0ad1ccf502271

    • SHA256

      d6b2953e626c42bc362193e4ccd959e02831378b8238e565abb95691c9edead3

    • SHA512

      688c0bf043ef905e8c353455a32291ab75939dcaee2829ec64173255293455f6e3912c38a9b6b6fd6befcae226a06be79aa996b9785b346bc30cb23565ba040b

    • SSDEEP

      24576:ywHUPzLpzA9YOSzhAuWQJLlfkOqkj9vUZ4KH5tkTar1euZf0s5R3Hmc3sHO:UPz1cYLnWQJOO39vUZ4KZGTabfz5R3Hb

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks