General

  • Target

    29516_Video_Oynatıcı.apk

  • Size

    2.6MB

  • Sample

    210803-eh9fky1cbx

  • MD5

    723d4d2c92d5d6da8fe7c30e21a3fe01

  • SHA1

    a898aaf26cbccc88c372c59414be88d5e3e7991a

  • SHA256

    9cbdd422daf93e15b2135f0f6feebf7428eaaaba4aeaf18c12e882e67a849c89

  • SHA512

    96b26e1462ba1cc02505c14ee1f54798b1f176c0a95a0564294980315038f5d2eaa02f0c558edd24fefb18dc52f20412044cecab9926b2ccba989bfc3284c895

Malware Config

Extracted

Family

hydra

C2

http://greysondowling458.xyz

Targets

    • Target

      29516_Video_Oynatıcı.apk

    • Size

      2.6MB

    • MD5

      723d4d2c92d5d6da8fe7c30e21a3fe01

    • SHA1

      a898aaf26cbccc88c372c59414be88d5e3e7991a

    • SHA256

      9cbdd422daf93e15b2135f0f6feebf7428eaaaba4aeaf18c12e882e67a849c89

    • SHA512

      96b26e1462ba1cc02505c14ee1f54798b1f176c0a95a0564294980315038f5d2eaa02f0c558edd24fefb18dc52f20412044cecab9926b2ccba989bfc3284c895

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks