General

  • Target

    36509_Video_Oynatıcı.apk

  • Size

    3.1MB

  • Sample

    210807-71sd752qfj

  • MD5

    5f9eff5c3af6f72e93937ba09f40b5d7

  • SHA1

    bdc23081a728a2557ceedcabf787e9847e6df159

  • SHA256

    ccebc2265cae07b7798d8bd7b194ae999f1e9f4b2652d3d220b873c23610f0c7

  • SHA512

    8d54d2d0297c617e0cab94b1feae1fc4e54250fd9fc66e8d5645a8a63cc000b5837dc0c6632559498bf054bc065bb3fa159027172f3711c4942c6e9a70916692

Malware Config

Extracted

Family

hydra

C2

http://courteneyguerrero584.xyz

Targets

    • Target

      36509_Video_Oynatıcı.apk

    • Size

      3.1MB

    • MD5

      5f9eff5c3af6f72e93937ba09f40b5d7

    • SHA1

      bdc23081a728a2557ceedcabf787e9847e6df159

    • SHA256

      ccebc2265cae07b7798d8bd7b194ae999f1e9f4b2652d3d220b873c23610f0c7

    • SHA512

      8d54d2d0297c617e0cab94b1feae1fc4e54250fd9fc66e8d5645a8a63cc000b5837dc0c6632559498bf054bc065bb3fa159027172f3711c4942c6e9a70916692

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks