General

  • Target

    c248c63c7832ca58587b1453b5a46d20

  • Size

    263KB

  • Sample

    240312-dgzejaed5z

  • MD5

    c248c63c7832ca58587b1453b5a46d20

  • SHA1

    c02c3e7722519e503da7822fc9bdbe42c07bf4ea

  • SHA256

    7c6000a4724f1c7c0b2d577e4c94f0cb494b7e65d901d1b7de66f9e1dd368929

  • SHA512

    95defaf54649f199051cbea316069973aa6f987d286de82ffc9712172a7439e3102c2a6d6e0382ada5034536065356de9e849f14530cd3c8d269af820c32a03a

  • SSDEEP

    6144:WPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNu:Ii6tQIwsBFa/IvcR9Uu

Malware Config

Targets

    • Target

      c248c63c7832ca58587b1453b5a46d20

    • Size

      263KB

    • MD5

      c248c63c7832ca58587b1453b5a46d20

    • SHA1

      c02c3e7722519e503da7822fc9bdbe42c07bf4ea

    • SHA256

      7c6000a4724f1c7c0b2d577e4c94f0cb494b7e65d901d1b7de66f9e1dd368929

    • SHA512

      95defaf54649f199051cbea316069973aa6f987d286de82ffc9712172a7439e3102c2a6d6e0382ada5034536065356de9e849f14530cd3c8d269af820c32a03a

    • SSDEEP

      6144:WPNvivXSCeVvnD2IJOsBFaw4IzEsS/ZXBc2Y4MT5fNu:Ii6tQIwsBFa/IvcR9Uu

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks