Resubmissions

28-05-2021 11:22

210528-rbz3kyfpqj 10

12-05-2021 05:47

210512-jsw7nexrce 7

General

  • Target

    40895_Video_Player.apk

  • Size

    4.8MB

  • Sample

    210528-rbz3kyfpqj

  • MD5

    63ccd6c2909ade6167815f7a1b542382

  • SHA1

    24800575be8b387f4e321caf67a6e26f30b91a82

  • SHA256

    b1a4be5c6a8eff345e9f6ad4bdc52b7f01ab0f5aefbb802e826058a0547f50e6

  • SHA512

    ce2b74329acb900988e9159578139566a6c1815d237115ef36ca2ddaccf4ad3b3ad48b46e291642c6a86a65c35a3fc4ba84a03beb62d9659bf5d781c471d254d

Malware Config

Targets

    • Target

      40895_Video_Player.apk

    • Size

      4.8MB

    • MD5

      63ccd6c2909ade6167815f7a1b542382

    • SHA1

      24800575be8b387f4e321caf67a6e26f30b91a82

    • SHA256

      b1a4be5c6a8eff345e9f6ad4bdc52b7f01ab0f5aefbb802e826058a0547f50e6

    • SHA512

      ce2b74329acb900988e9159578139566a6c1815d237115ef36ca2ddaccf4ad3b3ad48b46e291642c6a86a65c35a3fc4ba84a03beb62d9659bf5d781c471d254d

    • Hydra

      Android banker and info stealer.

    • Hydra Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks