General

  • Target

    6e419b22abc9db08adf553afdc9c14d4fc01d583c5ebeb8e2888ed8f20416086

  • Size

    6.2MB

  • Sample

    231219-3q4s2shchr

  • MD5

    d0efcd956fe8de01a8f527808c98d7fd

  • SHA1

    ce094b4da29c84f00bd5dd530a483d52593b8523

  • SHA256

    6e419b22abc9db08adf553afdc9c14d4fc01d583c5ebeb8e2888ed8f20416086

  • SHA512

    826418753e7300326e3a6b1f0c1df9e7947d8f3146c053cd8c802b72425f58963ab895b615983c59bb6445c83cba6681706a21a5c642f52db378cd01b0149a71

  • SSDEEP

    196608:VqtSpIwCK0RtVwWqZPFCLRyp0mp8GtyfYUAzSvJ:VsSuwitWbZqyak8GthUAeB

Score
7/10

Malware Config

Targets

    • Target

      6e419b22abc9db08adf553afdc9c14d4fc01d583c5ebeb8e2888ed8f20416086

    • Size

      6.2MB

    • MD5

      d0efcd956fe8de01a8f527808c98d7fd

    • SHA1

      ce094b4da29c84f00bd5dd530a483d52593b8523

    • SHA256

      6e419b22abc9db08adf553afdc9c14d4fc01d583c5ebeb8e2888ed8f20416086

    • SHA512

      826418753e7300326e3a6b1f0c1df9e7947d8f3146c053cd8c802b72425f58963ab895b615983c59bb6445c83cba6681706a21a5c642f52db378cd01b0149a71

    • SSDEEP

      196608:VqtSpIwCK0RtVwWqZPFCLRyp0mp8GtyfYUAzSvJ:VsSuwitWbZqyak8GthUAeB

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks