General

  • Target

    80635_Video_Oynatıcı.apk

  • Size

    3.0MB

  • Sample

    210813-t95nay82sx

  • MD5

    0b1c0ff2a98a57fa9ced149762b8fb9c

  • SHA1

    3b184ddb11435dcb5d3f5de724c0718d0ecfc859

  • SHA256

    f3461634486f4177f1dd18f89a06ca6a8c5bdf829604c15ecda2fa51c6a88c95

  • SHA512

    73f256c581cef280938a09d34ad2bd511fcec8d354d3dacb1d855ccdba15efeec97b4bdf1acd24168d57733ede7a8947b8762377f563b14c8612383838cb9963

Malware Config

Extracted

Family

hydra

C2

http://andrewavalos325.xyz

Targets

    • Target

      80635_Video_Oynatıcı.apk

    • Size

      3.0MB

    • MD5

      0b1c0ff2a98a57fa9ced149762b8fb9c

    • SHA1

      3b184ddb11435dcb5d3f5de724c0718d0ecfc859

    • SHA256

      f3461634486f4177f1dd18f89a06ca6a8c5bdf829604c15ecda2fa51c6a88c95

    • SHA512

      73f256c581cef280938a09d34ad2bd511fcec8d354d3dacb1d855ccdba15efeec97b4bdf1acd24168d57733ede7a8947b8762377f563b14c8612383838cb9963

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks