General

  • Target

    95802_Video_Oynatıcı.apk

  • Size

    3.0MB

  • Sample

    210812-fhgcg772ke

  • MD5

    cea98484826ce63b72d6efce2f692273

  • SHA1

    0630dfd3cd0bce10bbe3fd232592bba63a97c59b

  • SHA256

    c404340baa0e1322364c75898e7ffefcabb660bab01979c22ebd98a502bb2310

  • SHA512

    91b96d0c0c2f7ab6e298a7b48104f444e5617362a2155153545dc39e4ecda56f13d0f1709d8a6c541ee529cee6e6b82c362d25663603161521185cdee1071010

Malware Config

Extracted

Family

hydra

C2

http://andrewavalos325.xyz

Targets

    • Target

      95802_Video_Oynatıcı.apk

    • Size

      3.0MB

    • MD5

      cea98484826ce63b72d6efce2f692273

    • SHA1

      0630dfd3cd0bce10bbe3fd232592bba63a97c59b

    • SHA256

      c404340baa0e1322364c75898e7ffefcabb660bab01979c22ebd98a502bb2310

    • SHA512

      91b96d0c0c2f7ab6e298a7b48104f444e5617362a2155153545dc39e4ecda56f13d0f1709d8a6c541ee529cee6e6b82c362d25663603161521185cdee1071010

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks