General

  • Target

    edab679a4544b5a333b3e8eb77877fd1b1932a860cb596997fd7363c6c27cf54.zip

  • Size

    2.5MB

  • Sample

    210818-w3n8b2n84j

  • MD5

    345682665b3c31cfa81c2521a175ec37

  • SHA1

    59295942325cb740bba6bf83825aa135c98cc66a

  • SHA256

    c0d4e4539c246ec4c348f135713821f91173a1fd0090976d48f679a49c47e611

  • SHA512

    a9831cf4fef4ad5efac09c48a306539fb14293c839e2ef94b9beadc8e372ed9369dae815b8a31711e0d9e563ac94fc5a5ae9914d78e32870fab8697872e2f3e8

Malware Config

Extracted

Family

hydra

C2

http://bradleyforrest257.xyz

Targets

    • Target

      edab679a4544b5a333b3e8eb77877fd1b1932a860cb596997fd7363c6c27cf54

    • Size

      2.5MB

    • MD5

      b035015a7b34caf3b0560557019ab913

    • SHA1

      45b173e2c4453d3affd96db55f9e44c390670556

    • SHA256

      edab679a4544b5a333b3e8eb77877fd1b1932a860cb596997fd7363c6c27cf54

    • SHA512

      702dbc358f675d7b1bf68b1e347636ef376a3f1f73433457480d300f8e584e7fd89c0aeaa55a2ba75870609d1ed38b109943f6ba746d7584b66381ea4db01310

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks