General

  • Target

    5be75abccd902ab7be159797b23bb41ca1055602a08130cebb147d6712be55fe.apk

  • Size

    7.5MB

  • Sample

    210804-qhmelwp3ge

  • MD5

    bcf35b304c80aabf4a57e1d22132d507

  • SHA1

    9e7af980d678de60460f9786b9ed04d4337f2315

  • SHA256

    5be75abccd902ab7be159797b23bb41ca1055602a08130cebb147d6712be55fe

  • SHA512

    11dda802b3e8aeedb3488cbd0a79a09698772616d66d92c39b183d982cf478e39e63bd0498c55199c6bf5e19c5d1130d1b90ae77011bdfeeb9f5a2b613d97549

Malware Config

Targets

    • Target

      5be75abccd902ab7be159797b23bb41ca1055602a08130cebb147d6712be55fe.apk

    • Size

      7.5MB

    • MD5

      bcf35b304c80aabf4a57e1d22132d507

    • SHA1

      9e7af980d678de60460f9786b9ed04d4337f2315

    • SHA256

      5be75abccd902ab7be159797b23bb41ca1055602a08130cebb147d6712be55fe

    • SHA512

      11dda802b3e8aeedb3488cbd0a79a09698772616d66d92c39b183d982cf478e39e63bd0498c55199c6bf5e19c5d1130d1b90ae77011bdfeeb9f5a2b613d97549

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks