General

  • Target

    c0ee0cabb5ba83bcb20d81f37f58a46f

  • Size

    263KB

  • Sample

    240311-stryjseb5w

  • MD5

    c0ee0cabb5ba83bcb20d81f37f58a46f

  • SHA1

    6913126fd36136824c95e89e08a2e3f272ae4334

  • SHA256

    51ce9f6802a2283a972c71759c960de637ff0ca261f548103a974de522fbc8bb

  • SHA512

    977992fe2f5343eec914377555cdc33da83f1d1d82e541168fec11742e2e88770310318cc4c65ce967939a61db09f98d91e4980059a487d34f125532c7399972

  • SSDEEP

    6144:aSPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fN/:Ti6tQIwsBFa/IvcR9U/

Malware Config

Targets

    • Target

      c0ee0cabb5ba83bcb20d81f37f58a46f

    • Size

      263KB

    • MD5

      c0ee0cabb5ba83bcb20d81f37f58a46f

    • SHA1

      6913126fd36136824c95e89e08a2e3f272ae4334

    • SHA256

      51ce9f6802a2283a972c71759c960de637ff0ca261f548103a974de522fbc8bb

    • SHA512

      977992fe2f5343eec914377555cdc33da83f1d1d82e541168fec11742e2e88770310318cc4c65ce967939a61db09f98d91e4980059a487d34f125532c7399972

    • SSDEEP

      6144:aSPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fN/:Ti6tQIwsBFa/IvcR9U/

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks