General

  • Target

    45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4

  • Size

    544KB

  • Sample

    221126-bjz3qsee9y

  • MD5

    168d2951061ee5e0e8190847a887feb9

  • SHA1

    24a9dc299475a12e0f8a30447bf87a622639ea99

  • SHA256

    45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4

  • SHA512

    1033f161317fd2a8044f0ed4cbd017fae173d5ecc87b5dc273979fb8d0387053afee9a5f7a08bf4abaf4d8016223675fb5e4a3b80076baf117085a1baffbd216

  • SSDEEP

    12288:5QFx+y4uiyoLBHnty1KybK/2ARTJMI67jBTMO+iG2VYO8u/3SsH:5QbB4uUZvgAhmrBo9P2VKu/3SsH

Malware Config

Targets

    • Target

      45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4

    • Size

      544KB

    • MD5

      168d2951061ee5e0e8190847a887feb9

    • SHA1

      24a9dc299475a12e0f8a30447bf87a622639ea99

    • SHA256

      45c96469ec709c7dc9aecefbdfbce7b26c98c5e98cd9a84f9f730b6024926ca4

    • SHA512

      1033f161317fd2a8044f0ed4cbd017fae173d5ecc87b5dc273979fb8d0387053afee9a5f7a08bf4abaf4d8016223675fb5e4a3b80076baf117085a1baffbd216

    • SSDEEP

      12288:5QFx+y4uiyoLBHnty1KybK/2ARTJMI67jBTMO+iG2VYO8u/3SsH:5QbB4uUZvgAhmrBo9P2VKu/3SsH

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks