General

  • Target

    30284_Video_Oynatıcı.apk

  • Size

    3.3MB

  • Sample

    210818-45kah85k3j

  • MD5

    b7fd23008ba0a521e2155fab6e50433c

  • SHA1

    2cc0c9b7ffe598f2af7a40141270f901699b0156

  • SHA256

    0b20accac922de51e34a7dc637841d6071c92929ae9dc566f043b268871b58dc

  • SHA512

    9e9acb73c1e34ec319a70cc0710003bc2c3884fdb44b31937985a81b437e743b41bd4f55f2f2236a5b75957b6ed916e206f4ea2dfaf788c894dcd289d0b77a45

Malware Config

Extracted

Family

hydra

C2

http://leopoldpaine27.xyz

Targets

    • Target

      30284_Video_Oynatıcı.apk

    • Size

      3.3MB

    • MD5

      b7fd23008ba0a521e2155fab6e50433c

    • SHA1

      2cc0c9b7ffe598f2af7a40141270f901699b0156

    • SHA256

      0b20accac922de51e34a7dc637841d6071c92929ae9dc566f043b268871b58dc

    • SHA512

      9e9acb73c1e34ec319a70cc0710003bc2c3884fdb44b31937985a81b437e743b41bd4f55f2f2236a5b75957b6ed916e206f4ea2dfaf788c894dcd289d0b77a45

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.