General

  • Target

    5437768545239040.zip

  • Size

    6.7MB

  • Sample

    210729-nqcgxleaxs

  • MD5

    9bb1269b1f88e0df07dafffbd094bd46

  • SHA1

    0e4916afb9ac0f69b6c606628a15aa28c9512ce2

  • SHA256

    f2b52e2da932734af4a76f6d5b15fe3462ff670b97542a15be74ab3da2b36183

  • SHA512

    2502bd3f5e7c34b02f8cdedbea33ed7b2ebab3126a04a3640503df78eed04a5d9cd1150b060e6698cd67123bce7eee0ae243eeaebb8d69527a262d9bd1a96411

Malware Config

Targets

    • Target

      777f75d098d841673f9cda2ba28983fa181b6b92ac7c7ffb0dc04fbd6bb4a153

    • Size

      6.8MB

    • MD5

      04533b259e5623638184a37ce8a16ffb

    • SHA1

      1554d45d107ea56bdece179d7f3b1cefeff300c7

    • SHA256

      777f75d098d841673f9cda2ba28983fa181b6b92ac7c7ffb0dc04fbd6bb4a153

    • SHA512

      d5ad94ce47a197fa26e857eb2abe9da88d3c7f5e7f33cd262e7c54a494b2a5308363e3cac5a0e11a983e2fb60131a501049b9621f4036957eabc05d9b555a53c

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks