General

  • Target

    67580_Video_Oynatıcı.apk

  • Size

    3.0MB

  • Sample

    210813-yehmpgtzex

  • MD5

    62fb51c219728f90500e55b65c7a6d01

  • SHA1

    e8a874600e78886e5525aafbeb7d6284e980c169

  • SHA256

    4c9b59f488b0b3dcbf725bdf5f956fb18600da0687edf728a647590cf4c6ce67

  • SHA512

    1558dc6267509fc9191576c6262f124e3b3670954f16d56feebd94d503133995a0c34855de3af8d32e6b9b84df60acef8a452baed320b816c45201ecb807d816

Malware Config

Extracted

Family

hydra

C2

http://andrewavalos325.xyz

Targets

    • Target

      67580_Video_Oynatıcı.apk

    • Size

      3.0MB

    • MD5

      62fb51c219728f90500e55b65c7a6d01

    • SHA1

      e8a874600e78886e5525aafbeb7d6284e980c169

    • SHA256

      4c9b59f488b0b3dcbf725bdf5f956fb18600da0687edf728a647590cf4c6ce67

    • SHA512

      1558dc6267509fc9191576c6262f124e3b3670954f16d56feebd94d503133995a0c34855de3af8d32e6b9b84df60acef8a452baed320b816c45201ecb807d816

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks