General

  • Target

    5ff7214bdf16415f73de89eb3629fbfadbab4d7927307acefdc4e2b737951e73

  • Size

    546KB

  • Sample

    221127-r2nqesed24

  • MD5

    0f690e45b5cc7cc38609727e682669fa

  • SHA1

    5948c0f352f1120190d1ca4eaf5811ff6ee6db83

  • SHA256

    5ff7214bdf16415f73de89eb3629fbfadbab4d7927307acefdc4e2b737951e73

  • SHA512

    68efd4195fad8dfe08e7347c78759bbb27ce9063f2ab10a8c7595601456fa04992389668159fcb0669feb482c0c265abb8bfa789038f55363379e937dd2f89d8

  • SSDEEP

    12288:q2FxTC8ctDR9UwzcuIXVyapeDR4PzG5oF/X7516Pedg/Zfu:q2bu9D8woTFyawmPWoF/WPedOu

Malware Config

Targets

    • Target

      5ff7214bdf16415f73de89eb3629fbfadbab4d7927307acefdc4e2b737951e73

    • Size

      546KB

    • MD5

      0f690e45b5cc7cc38609727e682669fa

    • SHA1

      5948c0f352f1120190d1ca4eaf5811ff6ee6db83

    • SHA256

      5ff7214bdf16415f73de89eb3629fbfadbab4d7927307acefdc4e2b737951e73

    • SHA512

      68efd4195fad8dfe08e7347c78759bbb27ce9063f2ab10a8c7595601456fa04992389668159fcb0669feb482c0c265abb8bfa789038f55363379e937dd2f89d8

    • SSDEEP

      12288:q2FxTC8ctDR9UwzcuIXVyapeDR4PzG5oF/X7516Pedg/Zfu:q2bu9D8woTFyawmPWoF/WPedOu

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks