General

  • Target

    7902a6a0ac3b835fb43454f90a492b72

  • Size

    9.8MB

  • Sample

    240127-cmxbpaceam

  • MD5

    7902a6a0ac3b835fb43454f90a492b72

  • SHA1

    f1be98752609a51d5341f3524cfce6408cf93644

  • SHA256

    5969cb6e26629502ff0b7950d306e7e5368a39e162911ca01ffe812c5d14bbcf

  • SHA512

    e017ca87accd57f1daeb2b90b280cbe471b51ac0a93b732765e5667ac28499125cde699d298d1d5c557cfd9873f42784a24fd33263635d1456b6141c47720862

  • SSDEEP

    196608:Qg08+XURSa47av5fFmwqa3hatsKnIGC/Ure9M15uFZI2/XCP0TacdKcUD78N+WM:28+XU/hvlFdRUsKC/Ur/zWZI4S8b8c+H

Score
8/10

Malware Config

Targets

    • Target

      7902a6a0ac3b835fb43454f90a492b72

    • Size

      9.8MB

    • MD5

      7902a6a0ac3b835fb43454f90a492b72

    • SHA1

      f1be98752609a51d5341f3524cfce6408cf93644

    • SHA256

      5969cb6e26629502ff0b7950d306e7e5368a39e162911ca01ffe812c5d14bbcf

    • SHA512

      e017ca87accd57f1daeb2b90b280cbe471b51ac0a93b732765e5667ac28499125cde699d298d1d5c557cfd9873f42784a24fd33263635d1456b6141c47720862

    • SSDEEP

      196608:Qg08+XURSa47av5fFmwqa3hatsKnIGC/Ure9M15uFZI2/XCP0TacdKcUD78N+WM:28+XU/hvlFdRUsKC/Ur/zWZI4S8b8c+H

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks