General

  • Target

    d465b0e1a69498114b3f448d26542a973aa0877b2fc57f7fedd1149f7892d23d

  • Size

    19.5MB

  • Sample

    231224-e8hfrsfgaq

  • MD5

    05af6a3e704d2713bfab9fa177250dc4

  • SHA1

    5162450738fe63ab64a17d1b97f2c629f08bc805

  • SHA256

    d465b0e1a69498114b3f448d26542a973aa0877b2fc57f7fedd1149f7892d23d

  • SHA512

    e7fba1f5ff32406c380d295ef57a0c37c33f205acc2ccf7da0013892e44584f273eb0ef512ab33c0458eb78127c4edefd5d735d288396054d2fca233c4370d0a

  • SSDEEP

    393216:7jjNqeHH/k+kHXw1idNiGLE0cy+r2tF9Ymud3tS7gf/dgTRGF7/:7jjK+kH5uG4SF9C8c2TAp

Score
7/10

Malware Config

Targets

    • Target

      d465b0e1a69498114b3f448d26542a973aa0877b2fc57f7fedd1149f7892d23d

    • Size

      19.5MB

    • MD5

      05af6a3e704d2713bfab9fa177250dc4

    • SHA1

      5162450738fe63ab64a17d1b97f2c629f08bc805

    • SHA256

      d465b0e1a69498114b3f448d26542a973aa0877b2fc57f7fedd1149f7892d23d

    • SHA512

      e7fba1f5ff32406c380d295ef57a0c37c33f205acc2ccf7da0013892e44584f273eb0ef512ab33c0458eb78127c4edefd5d735d288396054d2fca233c4370d0a

    • SSDEEP

      393216:7jjNqeHH/k+kHXw1idNiGLE0cy+r2tF9Ymud3tS7gf/dgTRGF7/:7jjK+kH5uG4SF9C8c2TAp

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks