General

  • Target

    01836_Video_Oynatıcı.apk

  • Size

    2.6MB

  • Sample

    210801-qymd5x43ls

  • MD5

    5f08b7472011f988eb20f0b9619408a4

  • SHA1

    35f6b95f50b8a4dd63a4e353b7e92deec0216f5b

  • SHA256

    8e6271b1777abb0402a1b08bda491a17e4743d57053e312f3ff8918fb0dcfb55

  • SHA512

    db54bce5751f89c764d6843c44d325b4cf7efdb17721ea4902a47175337acecb38c115e62e254b8cc8275d1de65a0d025212b3649629460b35d61f2d5b3a2e49

Malware Config

Targets

    • Target

      01836_Video_Oynatıcı.apk

    • Size

      2.6MB

    • MD5

      5f08b7472011f988eb20f0b9619408a4

    • SHA1

      35f6b95f50b8a4dd63a4e353b7e92deec0216f5b

    • SHA256

      8e6271b1777abb0402a1b08bda491a17e4743d57053e312f3ff8918fb0dcfb55

    • SHA512

      db54bce5751f89c764d6843c44d325b4cf7efdb17721ea4902a47175337acecb38c115e62e254b8cc8275d1de65a0d025212b3649629460b35d61f2d5b3a2e49

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks