General

  • Target

    6cf4b4cd5ae971c031cfd9f6169145999a3ce1a8f4209312258511b9e4f849c9

  • Size

    263KB

  • Sample

    231219-3js3zagfhj

  • MD5

    0c646d2ab6aa53d4d285c0beaaab8106

  • SHA1

    88955f595100aa6d9917f22f188fb8deb6e8fed5

  • SHA256

    6cf4b4cd5ae971c031cfd9f6169145999a3ce1a8f4209312258511b9e4f849c9

  • SHA512

    52a3f1216d69f0f1080fcc52196eb10153c7f69c8d3d78bbdc0ef2f7cc5a6e2ca8a01a6d8828bb6806e98a0c6499297f83fa6a0aec6b3e54ad71f5f5bcd18885

  • SSDEEP

    6144:WbPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNc:W5i6tQIwsBFa/IvcR9Uc

Malware Config

Targets

    • Target

      6cf4b4cd5ae971c031cfd9f6169145999a3ce1a8f4209312258511b9e4f849c9

    • Size

      263KB

    • MD5

      0c646d2ab6aa53d4d285c0beaaab8106

    • SHA1

      88955f595100aa6d9917f22f188fb8deb6e8fed5

    • SHA256

      6cf4b4cd5ae971c031cfd9f6169145999a3ce1a8f4209312258511b9e4f849c9

    • SHA512

      52a3f1216d69f0f1080fcc52196eb10153c7f69c8d3d78bbdc0ef2f7cc5a6e2ca8a01a6d8828bb6806e98a0c6499297f83fa6a0aec6b3e54ad71f5f5bcd18885

    • SSDEEP

      6144:WbPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNc:W5i6tQIwsBFa/IvcR9Uc

    Score
    8/10
    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks