General

  • Target

    03978_Video_Oynatıcı.apk

  • Size

    2.5MB

  • Sample

    210725-7f186qhs9j

  • MD5

    3ae3933f6b8bcd87ad36fb6c9e299fa9

  • SHA1

    1824133d552e3d7351dc5f8460456b9381088d96

  • SHA256

    66e14d653714a39b9ce25bf32a3e5e42325381f3d054037ff4d628ba74c37ab4

  • SHA512

    9f58239cd65fd4affdafe185fb2e3b8ff5cd00f0b2b96484d2ee13c1ef21d811e08e6ac281dedc0a4148b59560beb805f4ca76439f4a187ab3e574f32ac91558

Malware Config

Targets

    • Target

      03978_Video_Oynatıcı.apk

    • Size

      2.5MB

    • MD5

      3ae3933f6b8bcd87ad36fb6c9e299fa9

    • SHA1

      1824133d552e3d7351dc5f8460456b9381088d96

    • SHA256

      66e14d653714a39b9ce25bf32a3e5e42325381f3d054037ff4d628ba74c37ab4

    • SHA512

      9f58239cd65fd4affdafe185fb2e3b8ff5cd00f0b2b96484d2ee13c1ef21d811e08e6ac281dedc0a4148b59560beb805f4ca76439f4a187ab3e574f32ac91558

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks