General

  • Target

    18562_Video_Oynatıcı.apk

  • Size

    3.2MB

  • Sample

    210824-mcf5ll673a

  • MD5

    1a1c0beae19827530fe6e3fea729845a

  • SHA1

    0accfe19ad55130c45063cd0cdadbe9cb002437f

  • SHA256

    1cd704ca2729a62bfab839ffdc5fd1c19de0bc15fb961da305c7ae1ccbe8e1c7

  • SHA512

    f6a89dd955d3f780883ab3a65be97859d1a6157465904d94e01ec6976a456037c1f92ce0a3feb6ebf434f398d28359765ac9fa1f47bf800b5933434a9ba2328d

Malware Config

Targets

    • Target

      18562_Video_Oynatıcı.apk

    • Size

      3.2MB

    • MD5

      1a1c0beae19827530fe6e3fea729845a

    • SHA1

      0accfe19ad55130c45063cd0cdadbe9cb002437f

    • SHA256

      1cd704ca2729a62bfab839ffdc5fd1c19de0bc15fb961da305c7ae1ccbe8e1c7

    • SHA512

      f6a89dd955d3f780883ab3a65be97859d1a6157465904d94e01ec6976a456037c1f92ce0a3feb6ebf434f398d28359765ac9fa1f47bf800b5933434a9ba2328d

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks