General

  • Target

    41500d30189f1bbd25ea3c2839372cfcff71cd5fce3600e5e2f81616365f35ba

  • Size

    5.9MB

  • Sample

    221125-kzcf2sad9s

  • MD5

    1a2180b48353c1061d8d95731e285875

  • SHA1

    05eae57548163ac58ea12412917022c8b59422fd

  • SHA256

    41500d30189f1bbd25ea3c2839372cfcff71cd5fce3600e5e2f81616365f35ba

  • SHA512

    8130b14518ab1826af4b572d8f99b3f76a53a24a77203fea5725e72f7750ebfb34f4778a80720755c03361aa6ba067bb5d4d3e62f93860cdab5aab778798f565

  • SSDEEP

    98304:8udd7abyWXwPOWbVI/GmfXM0+6bI/BWmIateAO1I/X0I/2JiJgpF6JvOcy6cl9z:vdRyyWgPjbVIOmfXT+SIRIme/IcI5Jgz

Malware Config

Targets

    • Target

      41500d30189f1bbd25ea3c2839372cfcff71cd5fce3600e5e2f81616365f35ba

    • Size

      5.9MB

    • MD5

      1a2180b48353c1061d8d95731e285875

    • SHA1

      05eae57548163ac58ea12412917022c8b59422fd

    • SHA256

      41500d30189f1bbd25ea3c2839372cfcff71cd5fce3600e5e2f81616365f35ba

    • SHA512

      8130b14518ab1826af4b572d8f99b3f76a53a24a77203fea5725e72f7750ebfb34f4778a80720755c03361aa6ba067bb5d4d3e62f93860cdab5aab778798f565

    • SSDEEP

      98304:8udd7abyWXwPOWbVI/GmfXM0+6bI/BWmIateAO1I/X0I/2JiJgpF6JvOcy6cl9z:vdRyyWgPjbVIOmfXT+SIRIme/IcI5Jgz

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks