General

  • Target

    9afaa372d732d9a920e8dc68ccc243a248f839f52dac33da41f69f2ba0941906.zip

  • Size

    3.1MB

  • Sample

    210817-5qn8ddnb1j

  • MD5

    f4166a94184a47486972e4a77c04674a

  • SHA1

    11c72524a4c8e85e389a15c7ad857d15c0b7fa02

  • SHA256

    bc76d2dd80cec82bcd2f18320cf880013bd6069e6c50f22948da0adf5301fa47

  • SHA512

    9a2106990e4b98e6e35ce96d3dd383fe10370d6f2568961a9263a5ad849a3b63f84f41b788478b34a905909caf4312d830e27046a18e5ba2b8162b94e38a4488

Malware Config

Targets

    • Target

      9afaa372d732d9a920e8dc68ccc243a248f839f52dac33da41f69f2ba0941906

    • Size

      3.1MB

    • MD5

      5f2a21c5569b01486fb791784aff7005

    • SHA1

      5c674b4543573ddc6008e9d013fbf5001fd3b923

    • SHA256

      9afaa372d732d9a920e8dc68ccc243a248f839f52dac33da41f69f2ba0941906

    • SHA512

      155a1b34bc78cd55fe4bb10dc8b5bafa65e23e6be4ee01a6139fc5bfb4b4ae9008fe2960b2ad4c5c9faa4ae4a8805c1e07edd790d745d5ede5ca766729ee653a

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks