General

  • Target

    30284_Video_Oynatıcı.apk

  • Size

    3.3MB

  • Sample

    210818-45kah85k3j

  • MD5

    b7fd23008ba0a521e2155fab6e50433c

  • SHA1

    2cc0c9b7ffe598f2af7a40141270f901699b0156

  • SHA256

    0b20accac922de51e34a7dc637841d6071c92929ae9dc566f043b268871b58dc

  • SHA512

    9e9acb73c1e34ec319a70cc0710003bc2c3884fdb44b31937985a81b437e743b41bd4f55f2f2236a5b75957b6ed916e206f4ea2dfaf788c894dcd289d0b77a45

Malware Config

Extracted

Family

hydra

C2

http://leopoldpaine27.xyz

Targets

    • Target

      30284_Video_Oynatıcı.apk

    • Size

      3.3MB

    • MD5

      b7fd23008ba0a521e2155fab6e50433c

    • SHA1

      2cc0c9b7ffe598f2af7a40141270f901699b0156

    • SHA256

      0b20accac922de51e34a7dc637841d6071c92929ae9dc566f043b268871b58dc

    • SHA512

      9e9acb73c1e34ec319a70cc0710003bc2c3884fdb44b31937985a81b437e743b41bd4f55f2f2236a5b75957b6ed916e206f4ea2dfaf788c894dcd289d0b77a45

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks