General

  • Target

    70bd38a8024f4815fe901d079b63aadf0cc4c56e00fb2e26bcddaaa74676f07c

  • Size

    2.0MB

  • Sample

    221125-np7e8aha9s

  • MD5

    7a6269f94e155db56ef3ace3d3eedbf9

  • SHA1

    b27bb8bf0e2437bfdc725188a2a7668659bf1b9f

  • SHA256

    70bd38a8024f4815fe901d079b63aadf0cc4c56e00fb2e26bcddaaa74676f07c

  • SHA512

    25619142fea49e0677eea7a5915aa4a61703e84d0f9c07042f315be487980ffce545b0cba443956520a096afa61e0f6185046c539e06d391722e3a14a65e404b

  • SSDEEP

    49152:gOILFA0tlO3hIOlo2GyUmSJ4jAIO+t8tvNlLF5TUnVoMdopG7OTPle:GA0rOx2UUmSJ4EIOBtvNlL3Tadog6TP8

Score
7/10

Malware Config

Targets

    • Target

      70bd38a8024f4815fe901d079b63aadf0cc4c56e00fb2e26bcddaaa74676f07c

    • Size

      2.0MB

    • MD5

      7a6269f94e155db56ef3ace3d3eedbf9

    • SHA1

      b27bb8bf0e2437bfdc725188a2a7668659bf1b9f

    • SHA256

      70bd38a8024f4815fe901d079b63aadf0cc4c56e00fb2e26bcddaaa74676f07c

    • SHA512

      25619142fea49e0677eea7a5915aa4a61703e84d0f9c07042f315be487980ffce545b0cba443956520a096afa61e0f6185046c539e06d391722e3a14a65e404b

    • SSDEEP

      49152:gOILFA0tlO3hIOlo2GyUmSJ4jAIO+t8tvNlLF5TUnVoMdopG7OTPle:GA0rOx2UUmSJ4EIOBtvNlL3Tadog6TP8

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks