General

  • Target

    38157_Video_Oynatıcı.apk

  • Size

    3.0MB

  • Sample

    210812-n13gr32lps

  • MD5

    6ebeb85ffe32db161606a7c53722b890

  • SHA1

    dc93b4458efebbc4a15a330840f0c92359e4de95

  • SHA256

    5ce41f4ecbfa8fa2855689ec3cfc1015ccf17f00ad28fa3bd26b4b8c86c56ad9

  • SHA512

    6c89168da5662aef9e5753f802e16791668c1820971304b349f5560e829dfec272f13eb3726a4d0c0f339579b4ca006f1d4acc904513c71da69a0a4ecf7c2c69

Malware Config

Extracted

Family

hydra

C2

http://miguelgonzales123.xyz

Targets

    • Target

      38157_Video_Oynatıcı.apk

    • Size

      3.0MB

    • MD5

      6ebeb85ffe32db161606a7c53722b890

    • SHA1

      dc93b4458efebbc4a15a330840f0c92359e4de95

    • SHA256

      5ce41f4ecbfa8fa2855689ec3cfc1015ccf17f00ad28fa3bd26b4b8c86c56ad9

    • SHA512

      6c89168da5662aef9e5753f802e16791668c1820971304b349f5560e829dfec272f13eb3726a4d0c0f339579b4ca006f1d4acc904513c71da69a0a4ecf7c2c69

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks