General

  • Target

    40862_Video_Oynatıcı.apk

  • Size

    2.6MB

  • Sample

    210805-yz3yjwxmcs

  • MD5

    8f31c64298921bd28072ab901e341b3c

  • SHA1

    749f248a8ab4311cccaf2f0bd1e3ce9fed444467

  • SHA256

    8ec3ec89c9ebac8e0f054913e0f443fd8b1fa2083d1cb2dbc31be4e94fab7208

  • SHA512

    6adfa1db6fdfcfe8acf11e6d76fefbc5b03d6dea8d9bb97b7999e686b0f403fcfbfbc4bb43e7dc230ae7f5e01c0ea2d401204c56fff527be7a99bda72249df21

Malware Config

Extracted

Family

hydra

C2

http://glennnewton547458.xyz

Targets

    • Target

      40862_Video_Oynatıcı.apk

    • Size

      2.6MB

    • MD5

      8f31c64298921bd28072ab901e341b3c

    • SHA1

      749f248a8ab4311cccaf2f0bd1e3ce9fed444467

    • SHA256

      8ec3ec89c9ebac8e0f054913e0f443fd8b1fa2083d1cb2dbc31be4e94fab7208

    • SHA512

      6adfa1db6fdfcfe8acf11e6d76fefbc5b03d6dea8d9bb97b7999e686b0f403fcfbfbc4bb43e7dc230ae7f5e01c0ea2d401204c56fff527be7a99bda72249df21

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Reads name of network operator

      Uses Android APIs to discover system information.

MITRE ATT&CK Matrix

Tasks