General

  • Target

    85106_Video_Oynatıcı.apk

  • Size

    3.2MB

  • Sample

    210824-67k7extkxs

  • MD5

    a69b063e1e864e17a29a9d28b3e41531

  • SHA1

    67aeb5e5033516434d2c111e35104130d834953e

  • SHA256

    182252ae86aae33b4b13b824357bc02218e94ae8daaadb69b85101c08e74773b

  • SHA512

    7d14318dbd9f5ad3ebe35e51e83f223b4455cdd379847c7f9dcf4a3045bb420fb41cbe67f51a111ce27e33af362a0a07603804d37356977f4e9c3cf4716f42c2

Malware Config

Extracted

Family

hydra

C2

http://maddisonmill35.xyz

Targets

    • Target

      85106_Video_Oynatıcı.apk

    • Size

      3.2MB

    • MD5

      a69b063e1e864e17a29a9d28b3e41531

    • SHA1

      67aeb5e5033516434d2c111e35104130d834953e

    • SHA256

      182252ae86aae33b4b13b824357bc02218e94ae8daaadb69b85101c08e74773b

    • SHA512

      7d14318dbd9f5ad3ebe35e51e83f223b4455cdd379847c7f9dcf4a3045bb420fb41cbe67f51a111ce27e33af362a0a07603804d37356977f4e9c3cf4716f42c2

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks