General

  • Target

    3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff

  • Size

    340KB

  • Sample

    221127-lasx6saf7s

  • MD5

    9faf67d3df57820b231a863ee8d10220

  • SHA1

    c7f7fbb5df2e7aa4fe80d01a6a894c3baf2c2345

  • SHA256

    3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff

  • SHA512

    f25c585a8ec60c5b815d067f0b77b60a4f29b13f9d0624bf55f908bcd27ab68793a665bc35c22ba041c94aa6140ba64532fbaa13f71d84c78035cf2ea740f71e

  • SSDEEP

    6144:sVmKRYOyCsBdQ5nlDRDWID4IcWV2W8azfIO:sVmKqrCsB8nlD5WcMW0Af5

Score
7/10

Malware Config

Targets

    • Target

      3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff

    • Size

      340KB

    • MD5

      9faf67d3df57820b231a863ee8d10220

    • SHA1

      c7f7fbb5df2e7aa4fe80d01a6a894c3baf2c2345

    • SHA256

      3845f4b3d1a77a661cfcd08e0e8e9532af8b76fad96585bb7700644931b13eff

    • SHA512

      f25c585a8ec60c5b815d067f0b77b60a4f29b13f9d0624bf55f908bcd27ab68793a665bc35c22ba041c94aa6140ba64532fbaa13f71d84c78035cf2ea740f71e

    • SSDEEP

      6144:sVmKRYOyCsBdQ5nlDRDWID4IcWV2W8azfIO:sVmKqrCsB8nlD5WcMW0Af5

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks