General

  • Target

    8fbbf4d7a7f009c302ec43ece6a02f2cef6726e824a38268c03c2cf09b2f5711

  • Size

    2.3MB

  • Sample

    221127-q8tpksga51

  • MD5

    b3dc58728b5888417a80133fc275575c

  • SHA1

    33ea0d3993d9add1036f6af54dbac971846cc66d

  • SHA256

    8fbbf4d7a7f009c302ec43ece6a02f2cef6726e824a38268c03c2cf09b2f5711

  • SHA512

    4e13f0bc4d3f9f7e714a8f870eed1f0f5a41dda6628e7524c4fef7f42d42bf68bf1d6e72255cdd7e502d3d984907a142e34f057242fc49b58b37ea85612d9d99

  • SSDEEP

    49152:2xyP6H1wSVKLgP+XzADRdCl+U+jnv8cFPkwO4cWroavZEdpob5POrOrxNDpAB6iJ:UH1a0mcw688PxGWroHdWbdOrOrlijQyv

Malware Config

Targets

    • Target

      8fbbf4d7a7f009c302ec43ece6a02f2cef6726e824a38268c03c2cf09b2f5711

    • Size

      2.3MB

    • MD5

      b3dc58728b5888417a80133fc275575c

    • SHA1

      33ea0d3993d9add1036f6af54dbac971846cc66d

    • SHA256

      8fbbf4d7a7f009c302ec43ece6a02f2cef6726e824a38268c03c2cf09b2f5711

    • SHA512

      4e13f0bc4d3f9f7e714a8f870eed1f0f5a41dda6628e7524c4fef7f42d42bf68bf1d6e72255cdd7e502d3d984907a142e34f057242fc49b58b37ea85612d9d99

    • SSDEEP

      49152:2xyP6H1wSVKLgP+XzADRdCl+U+jnv8cFPkwO4cWroavZEdpob5POrOrxNDpAB6iJ:UH1a0mcw688PxGWroHdWbdOrOrlijQyv

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks