General

  • Target

    3daf4f6ccd812d624dbfe2b10a986dc08e1a5de2

  • Size

    6.4MB

  • Sample

    230202-qz8r5scd8v

  • MD5

    36ae61a4f82db1cd8f57ba82491f15da

  • SHA1

    3daf4f6ccd812d624dbfe2b10a986dc08e1a5de2

  • SHA256

    50d0de94e2add46ed077c8c465244043d25810b9ca9aec678434d6290c59a0ba

  • SHA512

    f9b82cd05fd3b29e866077ad1dd84bff1b9a49f80590c2e7e4ef387b0b51100375ad09e6bdc9c44fb42c119050b47bfeba62f3cbd5c7a247d445d67e6bfbbaca

  • SSDEEP

    98304:tWDE4kVLjYipoHt/8tHzU2MRrFqAQdNhF1UkvAl/L2QeHzGtaujbrVI8L/Gacqyw:c44m/GYY2MVFnQb1UsA9DtaIdL/zww

Malware Config

Targets

    • Target

      3daf4f6ccd812d624dbfe2b10a986dc08e1a5de2

    • Size

      6.4MB

    • MD5

      36ae61a4f82db1cd8f57ba82491f15da

    • SHA1

      3daf4f6ccd812d624dbfe2b10a986dc08e1a5de2

    • SHA256

      50d0de94e2add46ed077c8c465244043d25810b9ca9aec678434d6290c59a0ba

    • SHA512

      f9b82cd05fd3b29e866077ad1dd84bff1b9a49f80590c2e7e4ef387b0b51100375ad09e6bdc9c44fb42c119050b47bfeba62f3cbd5c7a247d445d67e6bfbbaca

    • SSDEEP

      98304:tWDE4kVLjYipoHt/8tHzU2MRrFqAQdNhF1UkvAl/L2QeHzGtaujbrVI8L/Gacqyw:c44m/GYY2MVFnQb1UsA9DtaIdL/zww

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks