General

  • Target

    ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4

  • Size

    3.0MB

  • Sample

    221127-lp4yzsbh4w

  • MD5

    09647fcc43c94134505a3ca9439c4ecb

  • SHA1

    6ab8885b3299daedad79cbc168f2c2bd680c2c54

  • SHA256

    ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4

  • SHA512

    86b5272a39815d6ad27b6a67d6daef7e12135b078ab33b72235127fe3e15a6f83654d61739c7b391c36876681d3923c7515f14045f6c4052327762f14ba399e9

  • SSDEEP

    49152:X6OCZoRw4bWnFOWqmTfic6NDpBk2qN5/zqX5RkeRWpMFFvQWl9nvX:Xyuw4bWFgc6N1BHu5/+bkeRWKvvd/vX

Malware Config

Targets

    • Target

      ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4

    • Size

      3.0MB

    • MD5

      09647fcc43c94134505a3ca9439c4ecb

    • SHA1

      6ab8885b3299daedad79cbc168f2c2bd680c2c54

    • SHA256

      ddd98420acffef3914ac01a1e7b15ec9bd25f79c86d2e41dbdf61ad75a24d7e4

    • SHA512

      86b5272a39815d6ad27b6a67d6daef7e12135b078ab33b72235127fe3e15a6f83654d61739c7b391c36876681d3923c7515f14045f6c4052327762f14ba399e9

    • SSDEEP

      49152:X6OCZoRw4bWnFOWqmTfic6NDpBk2qN5/zqX5RkeRWpMFFvQWl9nvX:Xyuw4bWFgc6N1BHu5/+bkeRWKvvd/vX

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks