General

  • Target

    54738_Video_Oynatıcı.apk

  • Size

    3.1MB

  • Sample

    210807-74w5yeby26

  • MD5

    af830c008d42babdcdfd6520198e2ba7

  • SHA1

    e92981cc645439f71f2b5892d940da1b6b84744f

  • SHA256

    90afe99519b428fb7b39843af48838d70d997568609417e9d242858d3eceace8

  • SHA512

    2b0b8eac9b9601e6e3f9280aaf47407d6a7ce0599dbf90a9df12ff5353c0f6cc5a6760ae357ddedd4bed4c6ffe82161bd6011b0a3553e3a354f70dd44d5e86df

Malware Config

Extracted

Family

hydra

C2

http://courteneyguerrero584.xyz

Targets

    • Target

      54738_Video_Oynatıcı.apk

    • Size

      3.1MB

    • MD5

      af830c008d42babdcdfd6520198e2ba7

    • SHA1

      e92981cc645439f71f2b5892d940da1b6b84744f

    • SHA256

      90afe99519b428fb7b39843af48838d70d997568609417e9d242858d3eceace8

    • SHA512

      2b0b8eac9b9601e6e3f9280aaf47407d6a7ce0599dbf90a9df12ff5353c0f6cc5a6760ae357ddedd4bed4c6ffe82161bd6011b0a3553e3a354f70dd44d5e86df

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks