General

  • Target

    68930_Video_Oynatıcı.apk

  • Size

    3.2MB

  • Sample

    210824-8cpcej52ka

  • MD5

    7e8a7091147d1514a6826b66d2aea081

  • SHA1

    0807fefad7a37c75da6bffc7fa047b7ce09feb79

  • SHA256

    1a6c8a2854417027d380f9b3572c5e8ec655493fcedc7a95467a80177f6d26c8

  • SHA512

    79cdf6773fd87242d693af0a9225b8c53fa06d1175293ebda263729ebbc7a6aefc17b2d8400fbf05760156bfc33c58ecc6c7993f8476229200ddd15d2d23a715

Malware Config

Extracted

Family

hydra

C2

http://maddisonmill35.xyz

Targets

    • Target

      68930_Video_Oynatıcı.apk

    • Size

      3.2MB

    • MD5

      7e8a7091147d1514a6826b66d2aea081

    • SHA1

      0807fefad7a37c75da6bffc7fa047b7ce09feb79

    • SHA256

      1a6c8a2854417027d380f9b3572c5e8ec655493fcedc7a95467a80177f6d26c8

    • SHA512

      79cdf6773fd87242d693af0a9225b8c53fa06d1175293ebda263729ebbc7a6aefc17b2d8400fbf05760156bfc33c58ecc6c7993f8476229200ddd15d2d23a715

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks