General

  • Target

    01368_Video_Oynatıcı.apk

  • Size

    3.1MB

  • Sample

    210810-hqh4mn2rwx

  • MD5

    716003c3056c3d8483a1fb469596b7d9

  • SHA1

    cee5c812eaec44015c844718e211a162ce497f49

  • SHA256

    adca984304f23557bbab99360a86e331ac018d15c9fbdbcb286c9f7ecf2f53df

  • SHA512

    98b2b8149f0e5b45980e9439e1f1e01ec568048aad1bc08680be178b768b945ec230508dec4ff5d58e551c1a1958b3cd4ee6c044e4d3df8e17170be879d67954

Malware Config

Targets

    • Target

      01368_Video_Oynatıcı.apk

    • Size

      3.1MB

    • MD5

      716003c3056c3d8483a1fb469596b7d9

    • SHA1

      cee5c812eaec44015c844718e211a162ce497f49

    • SHA256

      adca984304f23557bbab99360a86e331ac018d15c9fbdbcb286c9f7ecf2f53df

    • SHA512

      98b2b8149f0e5b45980e9439e1f1e01ec568048aad1bc08680be178b768b945ec230508dec4ff5d58e551c1a1958b3cd4ee6c044e4d3df8e17170be879d67954

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks