General

  • Target

    54837_Video_Oynatıcı.apk

  • Size

    2.3MB

  • Sample

    210830-alaglbqbq2

  • MD5

    cc35c497b11ad865cd6e601847936d4f

  • SHA1

    1041180f91a03e7b34cb13e0f582a88a43d5a02f

  • SHA256

    c594e0edb7612d5ee07697951429851c9b5553e773add50697a4395227e5ce03

  • SHA512

    4cfe56006e422e85fb224e4f12a081ee76c1296ee26245c92de4a2f0a0a43440a4ac395a3d58c4a9d1f7310d8e4871f0f7799b00db97315049376936615beb39

Malware Config

Extracted

Family

hydra

C2

http://leannavelazquez6.xyz

Targets

    • Target

      54837_Video_Oynatıcı.apk

    • Size

      2.3MB

    • MD5

      cc35c497b11ad865cd6e601847936d4f

    • SHA1

      1041180f91a03e7b34cb13e0f582a88a43d5a02f

    • SHA256

      c594e0edb7612d5ee07697951429851c9b5553e773add50697a4395227e5ce03

    • SHA512

      4cfe56006e422e85fb224e4f12a081ee76c1296ee26245c92de4a2f0a0a43440a4ac395a3d58c4a9d1f7310d8e4871f0f7799b00db97315049376936615beb39

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks