General

  • Target

    17925_Video_Oynatıcı.apk

  • Size

    3.2MB

  • Sample

    210824-yjvtnsw6ts

  • MD5

    9277a80e4e55c8d79db6f99406c792ec

  • SHA1

    728b32ec63f091909af9cc7c666f651767fa31ad

  • SHA256

    c4844236e849260e5bd9d1a1d548c11667bc9f7c8c645c0a36180287a4fd48a7

  • SHA512

    3b35896052c6b99c64915617c11c87fbda2c73220dfd6f54beae2432189873182a3b5a32df57e42946cd82da9124541ca515b2fd5eabc3f43e428dfbe22cf307

Malware Config

Targets

    • Target

      17925_Video_Oynatıcı.apk

    • Size

      3.2MB

    • MD5

      9277a80e4e55c8d79db6f99406c792ec

    • SHA1

      728b32ec63f091909af9cc7c666f651767fa31ad

    • SHA256

      c4844236e849260e5bd9d1a1d548c11667bc9f7c8c645c0a36180287a4fd48a7

    • SHA512

      3b35896052c6b99c64915617c11c87fbda2c73220dfd6f54beae2432189873182a3b5a32df57e42946cd82da9124541ca515b2fd5eabc3f43e428dfbe22cf307

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks