General

  • Target

    64109_Video_Oynatıcı.apk

  • Size

    3.0MB

  • Sample

    210812-k13y9v8932

  • MD5

    c37ae32cd4bcce93797535082e2080a2

  • SHA1

    ae84294f83e45c8a9180cb6a0e658181fdee62fc

  • SHA256

    2b305310db25d5ac714d4e5df898fa336e0bb3b86039b42ea37762f00956b3ff

  • SHA512

    6b1005ce7b3749d94126be73e926bfea988a3961a95a493bb879e3efaea93b62936a13589c063601fda32cc1403b0b9639661dfe7183bb395c6d23c431f6506e

Malware Config

Extracted

Family

hydra

C2

http://miguelgonzales123.xyz

Targets

    • Target

      64109_Video_Oynatıcı.apk

    • Size

      3.0MB

    • MD5

      c37ae32cd4bcce93797535082e2080a2

    • SHA1

      ae84294f83e45c8a9180cb6a0e658181fdee62fc

    • SHA256

      2b305310db25d5ac714d4e5df898fa336e0bb3b86039b42ea37762f00956b3ff

    • SHA512

      6b1005ce7b3749d94126be73e926bfea988a3961a95a493bb879e3efaea93b62936a13589c063601fda32cc1403b0b9639661dfe7183bb395c6d23c431f6506e

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks