General

  • Target

    64109_Video_Oynatıcı.apk

  • Size

    3.0MB

  • Sample

    210812-k13y9v8932

  • MD5

    c37ae32cd4bcce93797535082e2080a2

  • SHA1

    ae84294f83e45c8a9180cb6a0e658181fdee62fc

  • SHA256

    2b305310db25d5ac714d4e5df898fa336e0bb3b86039b42ea37762f00956b3ff

  • SHA512

    6b1005ce7b3749d94126be73e926bfea988a3961a95a493bb879e3efaea93b62936a13589c063601fda32cc1403b0b9639661dfe7183bb395c6d23c431f6506e

Malware Config

Extracted

Family

hydra

C2

http://miguelgonzales123.xyz

Targets

    • Target

      64109_Video_Oynatıcı.apk

    • Size

      3.0MB

    • MD5

      c37ae32cd4bcce93797535082e2080a2

    • SHA1

      ae84294f83e45c8a9180cb6a0e658181fdee62fc

    • SHA256

      2b305310db25d5ac714d4e5df898fa336e0bb3b86039b42ea37762f00956b3ff

    • SHA512

      6b1005ce7b3749d94126be73e926bfea988a3961a95a493bb879e3efaea93b62936a13589c063601fda32cc1403b0b9639661dfe7183bb395c6d23c431f6506e

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.