General

  • Target

    69437_Video_Oynatıcı.apk

  • Size

    3.2MB

  • Sample

    210824-3b2p1mlvr2

  • MD5

    f5beab46dd72473a4d1cf3339ef6aecd

  • SHA1

    0c4f9b6957c583b554b2ec595eb0158b3a3ed13e

  • SHA256

    fc2e4bb692325fc6c3919b3961eb74ae0852c80ff2f02d2438bc45ca9d8be0fa

  • SHA512

    938e9f123531e081f93515920664f8fda645746fc3548fef72f9a4b8133da66735cd9ed6dab55b9aa8b2548f105730793c2f819a113cfa59facc4f7a3d69bd17

Malware Config

Extracted

Family

hydra

C2

http://maddisonmill35.xyz

Targets

    • Target

      69437_Video_Oynatıcı.apk

    • Size

      3.2MB

    • MD5

      f5beab46dd72473a4d1cf3339ef6aecd

    • SHA1

      0c4f9b6957c583b554b2ec595eb0158b3a3ed13e

    • SHA256

      fc2e4bb692325fc6c3919b3961eb74ae0852c80ff2f02d2438bc45ca9d8be0fa

    • SHA512

      938e9f123531e081f93515920664f8fda645746fc3548fef72f9a4b8133da66735cd9ed6dab55b9aa8b2548f105730793c2f819a113cfa59facc4f7a3d69bd17

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks