General

  • Target

    31706_Video_Oynatıcı.apk

  • Size

    3.1MB

  • Sample

    210810-dmxjs6t9g2

  • MD5

    f2979157677fc7d394eebf9274546651

  • SHA1

    d8bab05fb8bb87a72a6fd699b1283d4939242ee8

  • SHA256

    a8c9c4f38f72cf8cd3cd819936f1c1ea9670541ded180327f7b096a3370f2186

  • SHA512

    4527f0905e04780ac8b1a5feb34c2e76010f89566f5507a4bbf7cf45e0f6c735caddbd8ce4d66573c2e06162c4adf42123c009bbc52fe1693983e0dca3946623

Malware Config

Extracted

Family

hydra

C2

http://shaylaprince5.xyz

Targets

    • Target

      31706_Video_Oynatıcı.apk

    • Size

      3.1MB

    • MD5

      f2979157677fc7d394eebf9274546651

    • SHA1

      d8bab05fb8bb87a72a6fd699b1283d4939242ee8

    • SHA256

      a8c9c4f38f72cf8cd3cd819936f1c1ea9670541ded180327f7b096a3370f2186

    • SHA512

      4527f0905e04780ac8b1a5feb34c2e76010f89566f5507a4bbf7cf45e0f6c735caddbd8ce4d66573c2e06162c4adf42123c009bbc52fe1693983e0dca3946623

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks