General

  • Target

    55b815c4fbf2d56d0b1179b5375fe4cf

  • Size

    7.3MB

  • Sample

    231219-tc7s4shgfl

  • MD5

    55b815c4fbf2d56d0b1179b5375fe4cf

  • SHA1

    07a7871921c263f1b1724229ec24e968bffecd70

  • SHA256

    fbf03b43724bc39fa1fdd28e15f7ca1556d9c561dcf2cc7dd25a3f13aaab47d5

  • SHA512

    90d16a92a91f36104df733ed0204bbc46734130c377dc86982c02efcfc96a8d84a1f67a6b99fac383aaa973e223248b9914f8dbbbc645103c1450cb869244cf6

  • SSDEEP

    196608:oSsLa3DUbszu1DYBBzGW3BAWQpR3r679a3SCzo1Eqy5nz8+CGudk:0nIu1U1xBqpl+79YoTGrCGudk

Score
7/10

Malware Config

Targets

    • Target

      55b815c4fbf2d56d0b1179b5375fe4cf

    • Size

      7.3MB

    • MD5

      55b815c4fbf2d56d0b1179b5375fe4cf

    • SHA1

      07a7871921c263f1b1724229ec24e968bffecd70

    • SHA256

      fbf03b43724bc39fa1fdd28e15f7ca1556d9c561dcf2cc7dd25a3f13aaab47d5

    • SHA512

      90d16a92a91f36104df733ed0204bbc46734130c377dc86982c02efcfc96a8d84a1f67a6b99fac383aaa973e223248b9914f8dbbbc645103c1450cb869244cf6

    • SSDEEP

      196608:oSsLa3DUbszu1DYBBzGW3BAWQpR3r679a3SCzo1Eqy5nz8+CGudk:0nIu1U1xBqpl+79YoTGrCGudk

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks