General

  • Target

    119fb2128bb371555dc30a2d69593fe95e52fe4f6529e0aa00caed1b79db5076

  • Size

    7.5MB

  • Sample

    221125-x4hvvahg82

  • MD5

    1d76f25260d6dc064555786ce65fb570

  • SHA1

    31cbe7487304d79629fb545266cce068b0e4d61e

  • SHA256

    119fb2128bb371555dc30a2d69593fe95e52fe4f6529e0aa00caed1b79db5076

  • SHA512

    965a78cede2c2d0f04af5c3eaa3b0736f69ca9294c266d569bf588a4276e1dc09562d6fc6db925fed89f7f8a304c504ef11673afc115bddf7c19079e5651a9db

  • SSDEEP

    196608:M2GlSQOWZisl6te0rb9rTpbedsnSCIDn1+PTE3jjmUtn:MVSQniteYprSx12Ez9Z

Score
7/10

Malware Config

Targets

    • Target

      119fb2128bb371555dc30a2d69593fe95e52fe4f6529e0aa00caed1b79db5076

    • Size

      7.5MB

    • MD5

      1d76f25260d6dc064555786ce65fb570

    • SHA1

      31cbe7487304d79629fb545266cce068b0e4d61e

    • SHA256

      119fb2128bb371555dc30a2d69593fe95e52fe4f6529e0aa00caed1b79db5076

    • SHA512

      965a78cede2c2d0f04af5c3eaa3b0736f69ca9294c266d569bf588a4276e1dc09562d6fc6db925fed89f7f8a304c504ef11673afc115bddf7c19079e5651a9db

    • SSDEEP

      196608:M2GlSQOWZisl6te0rb9rTpbedsnSCIDn1+PTE3jjmUtn:MVSQniteYprSx12Ez9Z

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests dangerous framework permissions

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks