General

  • Target

    7637386a3b6fa15e1dac596a7a06eca2852ad45521dc8cbb22e26be0d1620952

  • Size

    7.5MB

  • Sample

    231220-a8d15agag2

  • MD5

    1596c6b8ab2b9fa1bb799baa18cd27f9

  • SHA1

    f50fca2bf281e311d54460ec740ea2d7d3b7f7f9

  • SHA256

    7637386a3b6fa15e1dac596a7a06eca2852ad45521dc8cbb22e26be0d1620952

  • SHA512

    3211d6df6c86afeb3bf443c321ee126b8ab54cc9fd53c2257c34b229fed55abd9f47e53dcdeb5d194ce4bf10ee43617cdfcc3d968744c9888b887dbb266f3987

  • SSDEEP

    196608:If197IgPQl7erWiZcBEMXJAKu3Ap+uMu40SJW0bnV1hrv0qew:If3I4QleNZc+gu3e+uMZl7bJMw

Score
8/10

Malware Config

Targets

    • Target

      7637386a3b6fa15e1dac596a7a06eca2852ad45521dc8cbb22e26be0d1620952

    • Size

      7.5MB

    • MD5

      1596c6b8ab2b9fa1bb799baa18cd27f9

    • SHA1

      f50fca2bf281e311d54460ec740ea2d7d3b7f7f9

    • SHA256

      7637386a3b6fa15e1dac596a7a06eca2852ad45521dc8cbb22e26be0d1620952

    • SHA512

      3211d6df6c86afeb3bf443c321ee126b8ab54cc9fd53c2257c34b229fed55abd9f47e53dcdeb5d194ce4bf10ee43617cdfcc3d968744c9888b887dbb266f3987

    • SSDEEP

      196608:If197IgPQl7erWiZcBEMXJAKu3Ap+uMu40SJW0bnV1hrv0qew:If3I4QleNZc+gu3e+uMZl7bJMw

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

    • Target

      UPPayPluginEx.apk

    • Size

      3.1MB

    • MD5

      8912e806d90605b3f9348e5d3572be9c

    • SHA1

      9135d9136e89f94d78f2ac8c122422809f371203

    • SHA256

      6b61ff101ae5d9e095751f10211553c11b2160885a9f3950ae8a4aed1e552e34

    • SHA512

      d5fd451155c5e966cb91b4c82cf891cbc90a69ad2dc9655bb40025aba0a274f8cf1634af719136a496a039b10deab608cd2aa2ccc7d240f91e9b0e60d4bb8ed4

    • SSDEEP

      98304:NAsdtkWUqCJghRkx1LoYGwQpRDhxI+7mFM/s:+sdtfUqCJghReU/w2BIIs

    Score
    1/10

MITRE ATT&CK Matrix

Tasks