General

  • Target

    Player.apk

  • Size

    7.6MB

  • Sample

    210729-9hwskctwpe

  • MD5

    8a603a5345a383458b1c8fec2f8508a5

  • SHA1

    cc4dcc5dfa8d0ca91d4db30eac502709d867ca57

  • SHA256

    533ef52c0f797cf7e2933860034cbd8c4c2cab040c11cb3c55a599c96e519e67

  • SHA512

    04e4b4e23fe1add662eabefdfcb2584b27e8c8cc41035b199a159bec7d67f3a0f74907f3e7e16ef6136ce9cc3a77a230fb95a856df920c91052a1511e33185b1

Malware Config

Targets

    • Target

      Player.apk

    • Size

      7.6MB

    • MD5

      8a603a5345a383458b1c8fec2f8508a5

    • SHA1

      cc4dcc5dfa8d0ca91d4db30eac502709d867ca57

    • SHA256

      533ef52c0f797cf7e2933860034cbd8c4c2cab040c11cb3c55a599c96e519e67

    • SHA512

      04e4b4e23fe1add662eabefdfcb2584b27e8c8cc41035b199a159bec7d67f3a0f74907f3e7e16ef6136ce9cc3a77a230fb95a856df920c91052a1511e33185b1

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks