General

  • Target

    80371_Video_Oynatıcı.apk

  • Size

    2.5MB

  • Sample

    210723-513anp2bh2

  • MD5

    93168d5b69885f1794dae5772b599f0b

  • SHA1

    50167a5c72b90e866ee9cec3b21015838d7bc000

  • SHA256

    a47d4dcdbbba7f39617c21269ef012d37c9c2830975767aac9c8d724459d6ba4

  • SHA512

    b1e21557f929471fdccc3717916e471356ca9672c7ad19d9920c8f19151198a681b2419b23690c071e9641828881e541795242da7ea9c338f6b5ea13f307163f

Malware Config

Targets

    • Target

      80371_Video_Oynatıcı.apk

    • Size

      2.5MB

    • MD5

      93168d5b69885f1794dae5772b599f0b

    • SHA1

      50167a5c72b90e866ee9cec3b21015838d7bc000

    • SHA256

      a47d4dcdbbba7f39617c21269ef012d37c9c2830975767aac9c8d724459d6ba4

    • SHA512

      b1e21557f929471fdccc3717916e471356ca9672c7ad19d9920c8f19151198a681b2419b23690c071e9641828881e541795242da7ea9c338f6b5ea13f307163f

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks