General

  • Target

    c09bc12ca7b36f922f0e5c5af136a78c

  • Size

    276KB

  • Sample

    240311-pt1znsah6y

  • MD5

    c09bc12ca7b36f922f0e5c5af136a78c

  • SHA1

    54751fdbd0da8f2ed1b72d42a22cec84f6815331

  • SHA256

    d63a834a3187fae69e34c5a85fe147046a1252624b339591fea12f96b4d8d60f

  • SHA512

    4bd5a418dbc603c434c12abb49335067210f1628a155833678d40c5aeebfd0e6334fa9853f67d6144cf060aacd8007d3ad77480cbc0424d1c886c9b3677eb34b

  • SSDEEP

    6144:6guKlMUzrxVBLc1YAlaXUI/igAdgzey7FDNaw4IzEsS/ZXBc2UA5fNk:6guYMs7ucdigAdgRlNa/IvcRgEk

Malware Config

Targets

    • Target

      c09bc12ca7b36f922f0e5c5af136a78c

    • Size

      276KB

    • MD5

      c09bc12ca7b36f922f0e5c5af136a78c

    • SHA1

      54751fdbd0da8f2ed1b72d42a22cec84f6815331

    • SHA256

      d63a834a3187fae69e34c5a85fe147046a1252624b339591fea12f96b4d8d60f

    • SHA512

      4bd5a418dbc603c434c12abb49335067210f1628a155833678d40c5aeebfd0e6334fa9853f67d6144cf060aacd8007d3ad77480cbc0424d1c886c9b3677eb34b

    • SSDEEP

      6144:6guKlMUzrxVBLc1YAlaXUI/igAdgzey7FDNaw4IzEsS/ZXBc2UA5fNk:6guYMs7ucdigAdgRlNa/IvcRgEk

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks