General

  • Target

    86207_Video_Oynatıcı.apk

  • Size

    2.6MB

  • Sample

    210801-y2qqvhlvls

  • MD5

    be3f91e3c4126d50cd746d11a169ddab

  • SHA1

    627c358b17a0221d9d856a1d3d229f6f19e8acf7

  • SHA256

    3e69bc260954f7afcd9a36dcfd1a93e9d24ca680bbc370913c023f70d1e761b1

  • SHA512

    c343a7c079289afa50cf76d416ae7d646214bfe79ed20b1dc4e91bb682e94a4d136fbc350b7fa5ef41ade33244dfb943358354eded2052fd875edb81f4dddea2

Malware Config

Targets

    • Target

      86207_Video_Oynatıcı.apk

    • Size

      2.6MB

    • MD5

      be3f91e3c4126d50cd746d11a169ddab

    • SHA1

      627c358b17a0221d9d856a1d3d229f6f19e8acf7

    • SHA256

      3e69bc260954f7afcd9a36dcfd1a93e9d24ca680bbc370913c023f70d1e761b1

    • SHA512

      c343a7c079289afa50cf76d416ae7d646214bfe79ed20b1dc4e91bb682e94a4d136fbc350b7fa5ef41ade33244dfb943358354eded2052fd875edb81f4dddea2

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks