General

  • Target

    f9299231f6111b59494aa13464531100e0c065b2a5eda451035f6f893c1933ce.apk

  • Size

    8.0MB

  • Sample

    210831-6he2v9tknn

  • MD5

    1bf9361597793ad62f44811063929695

  • SHA1

    2d7592b458828e6c3551800734c80e3632b711d8

  • SHA256

    f9299231f6111b59494aa13464531100e0c065b2a5eda451035f6f893c1933ce

  • SHA512

    b6152c315facce9e2fd1776693152b754790edf067f3806d459a8a1fce725b0a4cd385a0a281a0004daaf05ed41c9db6a85c5682d6fa4b357bc7b04d0fe7f0ca

Malware Config

Targets

    • Target

      f9299231f6111b59494aa13464531100e0c065b2a5eda451035f6f893c1933ce.apk

    • Size

      8.0MB

    • MD5

      1bf9361597793ad62f44811063929695

    • SHA1

      2d7592b458828e6c3551800734c80e3632b711d8

    • SHA256

      f9299231f6111b59494aa13464531100e0c065b2a5eda451035f6f893c1933ce

    • SHA512

      b6152c315facce9e2fd1776693152b754790edf067f3806d459a8a1fce725b0a4cd385a0a281a0004daaf05ed41c9db6a85c5682d6fa4b357bc7b04d0fe7f0ca

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks