General

  • Target

    5295a41d9e1e1ab47fb48ee949813f61fd71bf38a33d8b14e2da3ff4167e1270

  • Size

    6.4MB

  • Sample

    221127-ptnz4scc9y

  • MD5

    280ea4fa6ac91541d76c8c79ae6311dc

  • SHA1

    ac879e473aebb5e1401b64caef948715a3fb195d

  • SHA256

    5295a41d9e1e1ab47fb48ee949813f61fd71bf38a33d8b14e2da3ff4167e1270

  • SHA512

    a59c82f3dc28839de4404772116457695afdb39b8e11440a874591788e39c087f8f5c2d02975480cb3ccf6891c1fe01a292fc39f9b11bb330119c3f9f8e6a688

  • SSDEEP

    196608:MH1Rj74eHqeAmiU9rt1gRx0zSBIZk/51RmsVK80lrDJ6KP:Y1R34UzhiUxgE2BZ/575880lZ6KP

Score
7/10

Malware Config

Targets

    • Target

      5295a41d9e1e1ab47fb48ee949813f61fd71bf38a33d8b14e2da3ff4167e1270

    • Size

      6.4MB

    • MD5

      280ea4fa6ac91541d76c8c79ae6311dc

    • SHA1

      ac879e473aebb5e1401b64caef948715a3fb195d

    • SHA256

      5295a41d9e1e1ab47fb48ee949813f61fd71bf38a33d8b14e2da3ff4167e1270

    • SHA512

      a59c82f3dc28839de4404772116457695afdb39b8e11440a874591788e39c087f8f5c2d02975480cb3ccf6891c1fe01a292fc39f9b11bb330119c3f9f8e6a688

    • SSDEEP

      196608:MH1Rj74eHqeAmiU9rt1gRx0zSBIZk/51RmsVK80lrDJ6KP:Y1R34UzhiUxgE2BZ/575880lZ6KP

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks