General

  • Target

    25109_Video_Oynatıcı.apk

  • Size

    3.2MB

  • Sample

    210826-9k2zm527kj

  • MD5

    fd642953848d954af2a2733139e884f3

  • SHA1

    222240420ee054cace1202fd13ea97029eb922b1

  • SHA256

    03c8cba14139423ec179759052b178852ef7a3884a969876c2123bec7f7f8c65

  • SHA512

    df627de0e622f04cdb79ec7b260edfb7369daf95fc23eef3550d76542cac111afd111e517c323f8e183481551d24d3307e1cde389e14190158185dbee741f0c2

Malware Config

Extracted

Family

hydra

C2

http://lylaaustin462.xyz

Targets

    • Target

      25109_Video_Oynatıcı.apk

    • Size

      3.2MB

    • MD5

      fd642953848d954af2a2733139e884f3

    • SHA1

      222240420ee054cace1202fd13ea97029eb922b1

    • SHA256

      03c8cba14139423ec179759052b178852ef7a3884a969876c2123bec7f7f8c65

    • SHA512

      df627de0e622f04cdb79ec7b260edfb7369daf95fc23eef3550d76542cac111afd111e517c323f8e183481551d24d3307e1cde389e14190158185dbee741f0c2

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks