General

  • Target

    51749_Video_Oynatıcı.apk

  • Size

    3.0MB

  • Sample

    210813-g3ryc9yqv2

  • MD5

    78fa950df8e85e4866fbd9536567d1cd

  • SHA1

    b456d8806dbd21342773f73f120e64f7b0f3f8f7

  • SHA256

    20f45f1e7206b07876501aa829adae3e54b3620e733e7b8fee04c448078143b6

  • SHA512

    606821bd1afcaf6e7179881b6198f24619fd84efb9bf5e2e3d68b47b4510832c12af279993bac0c9f33c080767b62dd9742946be1ecb80c5d6802c67298c1658

Malware Config

Targets

    • Target

      51749_Video_Oynatıcı.apk

    • Size

      3.0MB

    • MD5

      78fa950df8e85e4866fbd9536567d1cd

    • SHA1

      b456d8806dbd21342773f73f120e64f7b0f3f8f7

    • SHA256

      20f45f1e7206b07876501aa829adae3e54b3620e733e7b8fee04c448078143b6

    • SHA512

      606821bd1afcaf6e7179881b6198f24619fd84efb9bf5e2e3d68b47b4510832c12af279993bac0c9f33c080767b62dd9742946be1ecb80c5d6802c67298c1658

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks