General

  • Target

    87362_Video_Oynatıcı.apk

  • Size

    3.1MB

  • Sample

    210809-tb1z8wxxm2

  • MD5

    141f171526468a833b82651bdc5076e2

  • SHA1

    bd25a345c660790d0afd89a89c51616d0fe87ce8

  • SHA256

    d0e3ea241c345f8988d9f0b9064c1ac1cce7bb2390b28021ee925097372a8308

  • SHA512

    c1b41d1ea501f7a5f3ca883c554c443a7178b417d7957d3b1f28d8a0aa02162f891f519e2d43b9dd2bc07cb07e6014fbc241b6be96299a66f3dea2b16db8aefe

Malware Config

Extracted

Family

hydra

C2

http://courteneyguerrero584.xyz

Targets

    • Target

      87362_Video_Oynatıcı.apk

    • Size

      3.1MB

    • MD5

      141f171526468a833b82651bdc5076e2

    • SHA1

      bd25a345c660790d0afd89a89c51616d0fe87ce8

    • SHA256

      d0e3ea241c345f8988d9f0b9064c1ac1cce7bb2390b28021ee925097372a8308

    • SHA512

      c1b41d1ea501f7a5f3ca883c554c443a7178b417d7957d3b1f28d8a0aa02162f891f519e2d43b9dd2bc07cb07e6014fbc241b6be96299a66f3dea2b16db8aefe

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks