General

  • Target

    34081_Video_Oynatıcı.apk

  • Size

    3.1MB

  • Sample

    210806-bw7w34153s

  • MD5

    9974bad66a83878b2307fa9906b47c02

  • SHA1

    d412add72df906b015bbd855d99c7d95fa58e546

  • SHA256

    d48f7a62bd78239ee8381d924088e6e6e048884bc0a9ee538bb2b6a70cad527f

  • SHA512

    b22d0049fc94ebee37565eba70591d3ebeb028c6e63ab52381cede49f244a883335387198766f757085e27a598b5b33ebb91f4bdb7b8c9878f59c83ea034c29d

Malware Config

Extracted

Family

hydra

C2

http://courteneyguerrero584.xyz

Targets

    • Target

      34081_Video_Oynatıcı.apk

    • Size

      3.1MB

    • MD5

      9974bad66a83878b2307fa9906b47c02

    • SHA1

      d412add72df906b015bbd855d99c7d95fa58e546

    • SHA256

      d48f7a62bd78239ee8381d924088e6e6e048884bc0a9ee538bb2b6a70cad527f

    • SHA512

      b22d0049fc94ebee37565eba70591d3ebeb028c6e63ab52381cede49f244a883335387198766f757085e27a598b5b33ebb91f4bdb7b8c9878f59c83ea034c29d

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks